Welcome to the The OWASP Zed Attack Proxy (ZAP) User Guide.
This is available both as context sensitive help within ZAP and online at
http://code.google.com/p/zaproxy/wiki/HelpIntro
ZAP jest łatwym w obsłudze, zintegrowanym narzędziem do testów penetracyjnych. Dzięki niemu można znaleźć luki w aplikacjach internetowych.
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
If you are new to ZAP then its recommended that you look at the Getting Started section.
ZAP is a fork of the open source variant of the Paros Proxy.
Rozpocznij | opis jak zacząć korzystać z ZAP | |
Basic concepts | for details of various basic concepts | |
UI Overview | for an overview of the User Interface | |
Command Line | for the command line options available | |
Releases | for details of the changes made in ZAP releases |
https://www.owasp.org/index.php/ZAP | the ZAP homepage | |
http://en.wikipedia.org/wiki/Proxy_server | the Wikipedia entry for proxies | |
http://www.parosproxy.org | the Paros proxy |