Skip to content

Commit afcc99c

Browse files
committed
Testfire (AltoroJ) Quick Start section
Signed-off-by: kingthorin <[email protected]>
1 parent 57fc07a commit afcc99c

File tree

1 file changed

+50
-7
lines changed

1 file changed

+50
-7
lines changed

site/content/docs/testapps/altoroj.md

Lines changed: 50 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,40 @@ It is a traditional app created in 2008 and is not updated very often.
1515
* Online: http://testfire.net/
1616
* Repo: https://github.com/HCL-TECH-SOFTWARE/AltoroJ
1717

18+
### Quick Start
19+
20+
New to ZAP and just want to quickly run ZAP against Testfire (AltoroJ)?
21+
22+
Just run these commands:
23+
24+
```bash
25+
# Download the recommended plan using curl, or use any other suitable tool
26+
curl -O https://raw.githubusercontent.com/zaproxy/community-scripts/refs/heads/main/other/af-plans/FullScanTestfireAuth.yaml
27+
28+
# Run ZAP using the stable Docker image, mapping the CWD so that Docker can access the file system and export the report
29+
docker run -v $(pwd):/zap/wrk/:rw -t zaproxy/zap-stable zap.sh -cmd -autorun wrk/FullScanTestfireAuth.yaml
30+
```
31+
32+
To run this command on Windows see the [relevant documentation](/docs/docker/about/#mounting-the-current-directory).
33+
34+
You will need to have Docker installed. If you do not want to use Docker then you can of course install ZAP locally.
35+
36+
The scan should find the following High and Medium risk alerts:
37+
38+
* 🔴 [Cross Site Scripting (Reflected](/docs/alerts/40012/)
39+
* 🔴 [SQL Injection](/docs/alerts/40018/)
40+
* 🔴 [External Redirect](/docs/alerts/20019/)
41+
* 🔴 [PII Disclosure](/docs/alerts/10062/)
42+
* 🟠 [Absence of Anti-CSRF Tokens](/docs/alerts/10202/)
43+
* 🟠 [Anti-CSRF Tokens Check](/docs/alerts/20012/)
44+
* 🟠 [Buffer Overflow](/docs/alerts/30001/) / I[nteger Overflow Error](/docs/alerts/30003/)
45+
* 🟠 [Missing Anti-clickjacking Header](/docs/alerts/10020/)
46+
* 🟠 [Relative Path Confusion](/docs/alerts/10051/)
47+
* 🟠 [Sub Resource Integrity Attribute Missing](/docs/alerts/90003/)
48+
* 🟠 [Content Security Policy (CSP) Header Not Set](/docs/alerts/10038/)
49+
50+
It will create an HTML report in your CWD containing full details of all of the issues found.
51+
1852
### Potential Pitfalls
1953

2054
This is an online app which may be unavailable or broken at any point.
@@ -52,9 +86,6 @@ env:
5286
- http://testfire.net
5387
includePaths:
5488
- http://testfire.net.*
55-
excludePaths:
56-
- http://testfire.net/logout.jsp
57-
- http://testfire.net/doLogin
5889
authentication:
5990
method: browser
6091
parameters:
@@ -66,7 +97,7 @@ env:
6697
loggedInRegex: \Q 200 OK\E
6798
loggedOutRegex: \Q 302 Found\E
6899
pollFrequency: 60
69-
pollUnits: requests
100+
pollUnits: seconds
70101
pollUrl: http://testfire.net/bank/main.jsp
71102
pollPostData: ""
72103
sessionManagement:
@@ -78,12 +109,24 @@ env:
78109
username: admin
79110
```
80111
112+
> [!NOTE]
113+
> There are no exclude paths added in the environment definition. Logout avoidance is used in the Traditional Spider job example below.
114+
> doLogin is left included as it is impacted by a SQLi vulnerability.
81115
82116
### Crawling
83117
84-
Any of the ZAP Spiders can be used to crawl AltoroJ.
118+
Any of the ZAP Spiders can be used to crawl Testfire (AltoroJ).
119+
120+
For the [Traditional Spider](/docs/desktop/addons/spider/) we recommend enabling
85121
86-
For the [Traditional Spider](/docs/desktop/addons/spider/) to be able to crawl the app you need to exclude the login and logout URLs from the context as above.
122+
```yaml
123+
- type: spider
124+
parameters:
125+
context: testfire
126+
user: jsmith
127+
url: http://testfire.net
128+
logoutAvoidance: true
129+
```
87130
88131
For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the logout link:
89132
@@ -101,6 +144,6 @@ For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the
101144
102145
### Scanning
103146
104-
We are not aware of a definitive list of the vulnerabilities in AltoroJ.
147+
We believe this is a definitive list of the vulnerabilities in Testfire (AltoroJ): https://help.hcl-software.com/appscan/ASoC/ja/PDF/Sample_DAST_Report.pdf
105148
106149
Not too surprisingly you will need to configure the [activeScan](/docs/desktop/addons/automation-framework/job-ascan/) job, and you will probably want to generate a [report](/docs/desktop/addons/report-generation/automation/).

0 commit comments

Comments
 (0)