Skip to content

Commit 5c1ed68

Browse files
committed
Testfire (AltoroJ) Quick Start section
Signed-off-by: kingthorin <[email protected]>
1 parent 57fc07a commit 5c1ed68

File tree

1 file changed

+54
-16
lines changed

1 file changed

+54
-16
lines changed

site/content/docs/testapps/altoroj.md

Lines changed: 54 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,38 @@ maintained by [HCL Software](https://www.hcl-software.com/).
1212

1313
It is a traditional app created in 2008 and is not updated very often.
1414

15-
* Online: http://testfire.net/
15+
* Online: https://demo.testfire.net/
1616
* Repo: https://github.com/HCL-TECH-SOFTWARE/AltoroJ
1717

18+
### Quick Start
19+
20+
New to ZAP and just want to quickly run ZAP against Testfire (AltoroJ)?
21+
22+
Just run these commands:
23+
24+
```bash
25+
# Download the recommended plan using curl, or use any other suitable tool
26+
curl -O https://raw.githubusercontent.com/zaproxy/community-scripts/refs/heads/main/other/af-plans/FullScanTestfireAuth.yaml
27+
28+
# Run ZAP using the stable Docker image, mapping the CWD so that Docker can access the file system and export the report
29+
docker run -v $(pwd):/zap/wrk/:rw -t zaproxy/zap-stable zap.sh -cmd -autorun wrk/FullScanTestfireAuth.yaml
30+
```
31+
32+
To run this command on Windows see the [relevant documentation](/docs/docker/about/#mounting-the-current-directory).
33+
34+
You will need to have Docker installed. If you do not want to use Docker then you can of course install ZAP locally.
35+
36+
The scan should find the following High and Medium risk alerts:
37+
38+
* 🔴 [Cross Site Scripting (Reflected](/docs/alerts/40012/)
39+
* 🔴 [SQL Injection](/docs/alerts/40018/)
40+
* 🟠 [Absence of Anti-CSRF Tokens](/docs/alerts/10202/)
41+
* 🟠 [Missing Anti-clickjacking Header](/docs/alerts/10020/)
42+
* 🟠 [Content Security Policy (CSP) Header Not Set](/docs/alerts/10038/)
43+
* 🟠 [Secure Pages Include Mixed Content (Including Scripts)](/docs/alerts/10040/)
44+
45+
It will create an HTML report in your CWD containing full details of all of the issues found.
46+
1847
### Potential Pitfalls
1948

2049
This is an online app which may be unavailable or broken at any point.
@@ -49,49 +78,58 @@ env:
4978
contexts:
5079
- name: testfire
5180
urls:
52-
- http://testfire.net
81+
- http://demo.testfire.net
5382
includePaths:
54-
- http://testfire.net.*
55-
excludePaths:
56-
- http://testfire.net/logout.jsp
57-
- http://testfire.net/doLogin
83+
- https://demo.testfire.net.*
5884
authentication:
5985
method: browser
6086
parameters:
61-
loginPageUrl: http://testfire.net/login.jsp
87+
loginPageUrl: https://demo.testfire.net/login.jsp
6288
loginPageWait: 2
6389
browserId: firefox
6490
verification:
6591
method: poll
6692
loggedInRegex: \Q 200 OK\E
6793
loggedOutRegex: \Q 302 Found\E
6894
pollFrequency: 60
69-
pollUnits: requests
70-
pollUrl: http://testfire.net/bank/main.jsp
95+
pollUnits: seconds
96+
pollUrl: https://demo.testfire.net/bank/main.jsp
7197
pollPostData: ""
7298
sessionManagement:
7399
method: headers
74100
users:
75-
- name: admin
101+
- name: jsmith
76102
credentials:
77-
password: admin
78-
username: admin
103+
password: demo1234
104+
username: jsmith
79105
```
80106
107+
> [!NOTE]
108+
> There are no exclude paths added in the environment definition. Logout avoidance is used in the Traditional Spider job example below.
109+
> doLogin is left included as it is impacted by a SQLi vulnerability.
81110
82111
### Crawling
83112
84-
Any of the ZAP Spiders can be used to crawl AltoroJ.
113+
Any of the ZAP Spiders can be used to crawl Testfire (AltoroJ).
114+
115+
For the [Traditional Spider](/docs/desktop/addons/spider/) we recommend the following configuration:
85116
86-
For the [Traditional Spider](/docs/desktop/addons/spider/) to be able to crawl the app you need to exclude the login and logout URLs from the context as above.
117+
```yaml
118+
- type: spider
119+
parameters:
120+
context: testfire
121+
user: jsmith
122+
url: https://demo.testfire.net
123+
logoutAvoidance: true
124+
```
87125
88126
For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the logout link:
89127
90128
``` yaml
91129
- type: spiderAjax
92130
parameters:
93131
context: testfire
94-
user: admin
132+
user: jsmith
95133
browserId: firefox-headless
96134
excludedElements:
97135
- description: Logout
@@ -101,6 +139,6 @@ For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the
101139
102140
### Scanning
103141
104-
We are not aware of a definitive list of the vulnerabilities in AltoroJ.
142+
We believe this is a definitive list of the vulnerabilities in Testfire (AltoroJ): https://help.hcl-software.com/appscan/ASoC/ja/PDF/Sample_DAST_Report.pdf
105143
106144
Not too surprisingly you will need to configure the [activeScan](/docs/desktop/addons/automation-framework/job-ascan/) job, and you will probably want to generate a [report](/docs/desktop/addons/report-generation/automation/).

0 commit comments

Comments
 (0)