Izdanje 1.1.0
Sljedeće promjene su urađene u ovoj verziji:
Značajne promjene:
OWASP rebranding
ZAP has been accepted as an OWASP project.
Početna stranica je sada: http://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
Brute Force
The ability to brute force files and directories based on code from the OWASP DirBuster project.
The new Brute Force tab shows the files and directories found.
Skeniranje Porta
The ability to port scan sites.
The new Port Scan tab shows the ports found.
Aktivni Sken tab
The new Aktivni Sken tab shows the requests and responses as a result of actively scanning a site.
Pauk tab
The Pauk tab now allows you to continue using ZAP while spidering a site.
You can also pause and resume the spider.
Smartcard support
Smart card support has been added c/o the Andiparos project.
The following smartcard devices have been tested on Windows:
| Safeguard | Aladdin eToken |
| | Aladdin eToken Pro |
| Omnikey | Omnikey 3121 |
| | CardMan 6121 |
| Gemalto | Reflex 20 V2 |
| | Swiss Stick |
The following smartcard devices are reported to work:
Attack menu
The new Sajtovi taba right click 'Attack' menu allows you to start various scans.
More internationalisation
All of the main tabs and menu items have now been internationalised.
Localisation
Support for the following languages are built into this version:
| Engleski | The default language |
| Brazilski Portugalski | |
| Njemački | |
| Poljski | |
| Španski | |
Odabir jezika
On start up you will be prompted to choose the language to use.
New languages are automatically detected by the presence of files with names of the form Messages_<locale>.properties in the ZAP directory.
Manje promjene:
Disabled 'default file' plugins
The plugins which detect default files are effectively made redundant by the new
brute force scanner.
These have therefore been disabled.
Scanner summaries
Counts of the number and types of the current scans are now displayed in the footer.
Još vidjeti
|
Uvod | uvod u ZAP
|
|
Izdanja | the full set of releases
|
|
Zasluge | the people and groups who have made this release possible
|