Skip to content

Commit 85ae5f3

Browse files
committed
Testfire (AltoroJ) Quick Start section
Signed-off-by: kingthorin <[email protected]>
1 parent 57fc07a commit 85ae5f3

File tree

1 file changed

+43
-8
lines changed

1 file changed

+43
-8
lines changed

site/content/docs/testapps/altoroj.md

Lines changed: 43 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,35 @@ It is a traditional app created in 2008 and is not updated very often.
1515
* Online: http://testfire.net/
1616
* Repo: https://github.com/HCL-TECH-SOFTWARE/AltoroJ
1717

18+
### Quick Start
19+
20+
New to ZAP and just want to quickly run ZAP against Testfire (AltoroJ)?
21+
22+
Just run these commands:
23+
24+
```bash
25+
# Download the recommended plan using curl, or use any other suitable tool
26+
curl -O https://raw.githubusercontent.com/zaproxy/community-scripts/refs/heads/main/other/af-plans/FullScanTestfireAuth.yaml
27+
28+
# Run ZAP using the stable Docker image, mapping the CWD so that Docker can access the file system and export the report
29+
docker run -v $(pwd):/zap/wrk/:rw -t zaproxy/zap-stable zap.sh -cmd -autorun wrk/FullScanTestfireAuth.yaml
30+
```
31+
32+
To run this command on Windows see the [relevant documentation](/docs/docker/about/#mounting-the-current-directory).
33+
34+
You will need to have Docker installed. If you do not want to use Docker then you can of course install ZAP locally.
35+
36+
The scan should find the following High and Medium risk alerts:
37+
38+
* 🔴 [Cross Site Scripting (Reflected](/docs/alerts/40012/)
39+
* 🔴 [SQL Injection](/docs/alerts/40018/)
40+
* 🔴 [External Redirect](/docs/alerts/20019/)
41+
* 🔴 [PII Disclosure](/docs/alerts/10062/)
42+
* 🟠 [Absence of Anti-CSRF Tokens](/docs/alerts/10202/)
43+
* 🟠 [Content Security Policy (CSP) Header Not Set](/docs/alerts/10038/)
44+
45+
It will create an HTML report in your CWD containing full details of all of the issues found.
46+
1847
### Potential Pitfalls
1948

2049
This is an online app which may be unavailable or broken at any point.
@@ -52,9 +81,7 @@ env:
5281
- http://testfire.net
5382
includePaths:
5483
- http://testfire.net.*
55-
excludePaths:
56-
- http://testfire.net/logout.jsp
57-
- http://testfire.net/doLogin
84+
- https://testfire.net.*
5885
authentication:
5986
method: browser
6087
parameters:
@@ -66,7 +93,7 @@ env:
6693
loggedInRegex: \Q 200 OK\E
6794
loggedOutRegex: \Q 302 Found\E
6895
pollFrequency: 60
69-
pollUnits: requests
96+
pollUnits: seconds
7097
pollUrl: http://testfire.net/bank/main.jsp
7198
pollPostData: ""
7299
sessionManagement:
@@ -78,12 +105,20 @@ env:
78105
username: admin
79106
```
80107
81-
82108
### Crawling
83109
84-
Any of the ZAP Spiders can be used to crawl AltoroJ.
110+
Any of the ZAP Spiders can be used to crawl Testfire (AltoroJ).
85111
86-
For the [Traditional Spider](/docs/desktop/addons/spider/) to be able to crawl the app you need to exclude the login and logout URLs from the context as above.
112+
For the [Traditional Spider](/docs/desktop/addons/spider/) we recommend enabling
113+
114+
```yaml
115+
- type: spider
116+
parameters:
117+
context: testfire
118+
user: jsmith
119+
url: http://testfire.net
120+
logoutAvoidance: true
121+
```
87122
88123
For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the logout link:
89124
@@ -101,6 +136,6 @@ For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the
101136
102137
### Scanning
103138
104-
We are not aware of a definitive list of the vulnerabilities in AltoroJ.
139+
We believe this is a definitive list of the vulnerabilities in Testfire (AltoroJ): https://help.hcl-software.com/appscan/ASoC/ja/PDF/Sample_DAST_Report.pdf
105140
106141
Not too surprisingly you will need to configure the [activeScan](/docs/desktop/addons/automation-framework/job-ascan/) job, and you will probably want to generate a [report](/docs/desktop/addons/report-generation/automation/).

0 commit comments

Comments
 (0)