websecurity@lists.webappsec.org

The Web Security Mailing List

View all threads

Tools to Reproduce Vulnerabilities?

JD
Jason Drury
Wed, Oct 15, 2014 5:12 PM

All,

Do you use any tool(s) easily reproduce vulnerabilities for developers? I am only aware of Selenium (http://www.seleniumhq.org/). I guess you could also use wget or curl, but I think a gui would be best.

Thanks,
Jason

All, Do you use any tool(s) easily reproduce vulnerabilities for developers? I am only aware of Selenium (http://www.seleniumhq.org/). I guess you could also use wget or curl, but I think a gui would be best. Thanks, Jason
WJ
Will Jefferies
Wed, Oct 15, 2014 8:22 PM

I use an interception proxy when I need to demo vulns for dev.  Fiddler v2 and/or Burpsuite Pro gets the job done nicely.

From: websecurity [mailto:websecurity-bounces@lists.webappsec.org] On Behalf Of Jason Drury
Sent: Wednesday, October 15, 2014 12:15 PM
To: websecurity
Subject: [WEB SECURITY] Tools to Reproduce Vulnerabilities?

All,

Do you use any tool(s) easily reproduce vulnerabilities for developers? I am only aware of Selenium (http://www.seleniumhq.org/). I guess you could also use wget or curl, but I think a gui would be best.

Thanks,
Jason

Confidentiality Notice: This message is for the sole use of the intended recipient(s).  It may contain confidential or proprietary information and may be subject to the attorney-client privilege or other confidentiality protections. If this message was misdirected, neither FNC Holding Company, Inc. nor any of its subsidiaries waive any confidentiality, privilege, or trade secrets. If you are not a designated recipient, you may not review, print, copy, retransmit, disseminate, or otherwise use this message. If you have received this message in error, please notify the sender by reply e-mail and delete this message.

I use an interception proxy when I need to demo vulns for dev. Fiddler v2 and/or Burpsuite Pro gets the job done nicely. From: websecurity [mailto:websecurity-bounces@lists.webappsec.org] On Behalf Of Jason Drury Sent: Wednesday, October 15, 2014 12:15 PM To: websecurity Subject: [WEB SECURITY] Tools to Reproduce Vulnerabilities? All, Do you use any tool(s) easily reproduce vulnerabilities for developers? I am only aware of Selenium (http://www.seleniumhq.org/). I guess you could also use wget or curl, but I think a gui would be best. Thanks, Jason Confidentiality Notice: This message is for the sole use of the intended recipient(s). It may contain confidential or proprietary information and may be subject to the attorney-client privilege or other confidentiality protections. If this message was misdirected, neither FNC Holding Company, Inc. nor any of its subsidiaries waive any confidentiality, privilege, or trade secrets. If you are not a designated recipient, you may not review, print, copy, retransmit, disseminate, or otherwise use this message. If you have received this message in error, please notify the sender by reply e-mail and delete this message.
P
psiinon
Wed, Oct 15, 2014 8:53 PM

Thats one of the use cases for Zest:
https://blog.mozilla.org/security/2014/01/20/reporting-web-vulnerabilities-to-mozilla-using-zest/
https://developer.mozilla.org/en-US/docs/zest

Zest is a open source graphical scripting language, and essentially the
macro language for ZAP (which is also completely free and open source).
You can very quickly record Zest scripts using ZAP, and graphically edit
them to include constructs like conditionals and loops.
Since the Mozilla blog post Zest also supports client side scripting (using
Selenium).
At AppSec EU I demoed a client side Zest script which automates
registration of Mozilla Persona via Mailinator
https://www.youtube.com/watch?v=Ofmp-haNI7s
Other tools such as OWTF have also adopted Zest, and we'd love other tools,
both open source and commercial, to adopt it.

Simon

On Wed, Oct 15, 2014 at 9:22 PM, Will Jefferies wjefferies@fncinc.com
wrote:

I use an interception proxy when I need to demo vulns for dev.  Fiddler
v2 and/or Burpsuite Pro gets the job done nicely.

From: websecurity [mailto:websecurity-bounces@lists.webappsec.org] *On
Behalf Of *Jason Drury
Sent: Wednesday, October 15, 2014 12:15 PM
To: websecurity
Subject: [WEB SECURITY] Tools to Reproduce Vulnerabilities?

All,

Do you use any tool(s) easily reproduce vulnerabilities for developers? I
am only aware of Selenium (http://www.seleniumhq.org/). I guess you could
also use wget or curl, but I think a gui would be best.

Thanks,

Jason

Confidentiality Notice: This message is for the sole use of the intended
recipient(s).  It may contain confidential or proprietary information and
may be subject to the attorney-client privilege or other confidentiality
protections. If this message was misdirected, neither FNC Holding Company,
Inc. nor any of its subsidiaries waive any confidentiality, privilege, or
trade secrets. If you are not a designated recipient, you may not review,
print, copy, retransmit, disseminate, or otherwise use this message. If you
have received this message in error, please notify the sender by reply
e-mail and delete this message.


The Web Security Mailing List

WebSecurity RSS Feed
http://www.webappsec.org/rss/websecurity.rss

Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA

WASC on Twitter
http://twitter.com/wascupdates

websecurity@lists.webappsec.org
http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org

--
OWASP ZAP https://www.owasp.org/index.php/ZAP Project leader

Thats one of the use cases for Zest: https://blog.mozilla.org/security/2014/01/20/reporting-web-vulnerabilities-to-mozilla-using-zest/ https://developer.mozilla.org/en-US/docs/zest Zest is a open source graphical scripting language, and essentially the macro language for ZAP (which is also completely free and open source). You can very quickly record Zest scripts using ZAP, and graphically edit them to include constructs like conditionals and loops. Since the Mozilla blog post Zest also supports client side scripting (using Selenium). At AppSec EU I demoed a client side Zest script which automates registration of Mozilla Persona via Mailinator https://www.youtube.com/watch?v=Ofmp-haNI7s Other tools such as OWTF have also adopted Zest, and we'd love other tools, both open source and commercial, to adopt it. Simon On Wed, Oct 15, 2014 at 9:22 PM, Will Jefferies <wjefferies@fncinc.com> wrote: > I use an interception proxy when I need to demo vulns for dev. Fiddler > v2 and/or Burpsuite Pro gets the job done nicely. > > > > > > *From:* websecurity [mailto:websecurity-bounces@lists.webappsec.org] *On > Behalf Of *Jason Drury > *Sent:* Wednesday, October 15, 2014 12:15 PM > *To:* websecurity > *Subject:* [WEB SECURITY] Tools to Reproduce Vulnerabilities? > > > > All, > > > > Do you use any tool(s) easily reproduce vulnerabilities for developers? I > am only aware of Selenium (http://www.seleniumhq.org/). I guess you could > also use wget or curl, but I think a gui would be best. > > > > Thanks, > > Jason > > > > > Confidentiality Notice: This message is for the sole use of the intended > recipient(s). It may contain confidential or proprietary information and > may be subject to the attorney-client privilege or other confidentiality > protections. If this message was misdirected, neither FNC Holding Company, > Inc. nor any of its subsidiaries waive any confidentiality, privilege, or > trade secrets. If you are not a designated recipient, you may not review, > print, copy, retransmit, disseminate, or otherwise use this message. If you > have received this message in error, please notify the sender by reply > e-mail and delete this message. > > > _______________________________________________ > The Web Security Mailing List > > WebSecurity RSS Feed > http://www.webappsec.org/rss/websecurity.rss > > Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA > > WASC on Twitter > http://twitter.com/wascupdates > > websecurity@lists.webappsec.org > http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org > > -- OWASP ZAP <https://www.owasp.org/index.php/ZAP> Project leader
WJ
Will Jefferies
Wed, Oct 15, 2014 9:01 PM

Ah yes, Zest.  I haven’t taken a look at that project in a while.  Perhaps it’s time to revisit.

From: psiinon [mailto:psiinon@gmail.com]
Sent: Wednesday, October 15, 2014 3:53 PM
To: Will Jefferies
Cc: Jason Drury; websecurity
Subject: Re: [WEB SECURITY] Tools to Reproduce Vulnerabilities?

Thats one of the use cases for Zest:
https://blog.mozilla.org/security/2014/01/20/reporting-web-vulnerabilities-to-mozilla-using-zest/
https://developer.mozilla.org/en-US/docs/zest

Zest is a open source graphical scripting language, and essentially the macro language for ZAP (which is also completely free and open source).
You can very quickly record Zest scripts using ZAP, and graphically edit them to include constructs like conditionals and loops.
Since the Mozilla blog post Zest also supports client side scripting (using Selenium).
At AppSec EU I demoed a client side Zest script which automates registration of Mozilla Persona via Mailinator https://www.youtube.com/watch?v=Ofmp-haNI7s
Other tools such as OWTF have also adopted Zest, and we'd love other tools, both open source and commercial, to adopt it.
Simon

On Wed, Oct 15, 2014 at 9:22 PM, Will Jefferies <wjefferies@fncinc.commailto:wjefferies@fncinc.com> wrote:
I use an interception proxy when I need to demo vulns for dev.  Fiddler v2 and/or Burpsuite Pro gets the job done nicely.

From: websecurity [mailto:websecurity-bounces@lists.webappsec.orgmailto:websecurity-bounces@lists.webappsec.org] On Behalf Of Jason Drury
Sent: Wednesday, October 15, 2014 12:15 PM
To: websecurity
Subject: [WEB SECURITY] Tools to Reproduce Vulnerabilities?

All,

Do you use any tool(s) easily reproduce vulnerabilities for developers? I am only aware of Selenium (http://www.seleniumhq.org/). I guess you could also use wget or curl, but I think a gui would be best.

Thanks,
Jason

Confidentiality Notice: This message is for the sole use of the intended recipient(s).  It may contain confidential or proprietary information and may be subject to the attorney-client privilege or other confidentiality protections. If this message was misdirected, neither FNC Holding Company, Inc. nor any of its subsidiaries waive any confidentiality, privilege, or trade secrets. If you are not a designated recipient, you may not review, print, copy, retransmit, disseminate, or otherwise use this message. If you have received this message in error, please notify the sender by reply e-mail and delete this message.


The Web Security Mailing List

WebSecurity RSS Feed
http://www.webappsec.org/rss/websecurity.rss

Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA

WASC on Twitter
http://twitter.com/wascupdates

websecurity@lists.webappsec.orgmailto:websecurity@lists.webappsec.org
http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org

--
OWASP ZAPhttps://www.owasp.org/index.php/ZAP Project leader

Confidentiality Notice: This message is for the sole use of the intended recipient(s).  It may contain confidential or proprietary information and may be subject to the attorney-client privilege or other confidentiality protections. If this message was misdirected, neither FNC Holding Company, Inc. nor any of its subsidiaries waive any confidentiality, privilege, or trade secrets. If you are not a designated recipient, you may not review, print, copy, retransmit, disseminate, or otherwise use this message. If you have received this message in error, please notify the sender by reply e-mail and delete this message.

Ah yes, Zest. I haven’t taken a look at that project in a while. Perhaps it’s time to revisit. From: psiinon [mailto:psiinon@gmail.com] Sent: Wednesday, October 15, 2014 3:53 PM To: Will Jefferies Cc: Jason Drury; websecurity Subject: Re: [WEB SECURITY] Tools to Reproduce Vulnerabilities? Thats one of the use cases for Zest: https://blog.mozilla.org/security/2014/01/20/reporting-web-vulnerabilities-to-mozilla-using-zest/ https://developer.mozilla.org/en-US/docs/zest Zest is a open source graphical scripting language, and essentially the macro language for ZAP (which is also completely free and open source). You can very quickly record Zest scripts using ZAP, and graphically edit them to include constructs like conditionals and loops. Since the Mozilla blog post Zest also supports client side scripting (using Selenium). At AppSec EU I demoed a client side Zest script which automates registration of Mozilla Persona via Mailinator https://www.youtube.com/watch?v=Ofmp-haNI7s Other tools such as OWTF have also adopted Zest, and we'd love other tools, both open source and commercial, to adopt it. Simon On Wed, Oct 15, 2014 at 9:22 PM, Will Jefferies <wjefferies@fncinc.com<mailto:wjefferies@fncinc.com>> wrote: I use an interception proxy when I need to demo vulns for dev. Fiddler v2 and/or Burpsuite Pro gets the job done nicely. From: websecurity [mailto:websecurity-bounces@lists.webappsec.org<mailto:websecurity-bounces@lists.webappsec.org>] On Behalf Of Jason Drury Sent: Wednesday, October 15, 2014 12:15 PM To: websecurity Subject: [WEB SECURITY] Tools to Reproduce Vulnerabilities? All, Do you use any tool(s) easily reproduce vulnerabilities for developers? I am only aware of Selenium (http://www.seleniumhq.org/). I guess you could also use wget or curl, but I think a gui would be best. Thanks, Jason Confidentiality Notice: This message is for the sole use of the intended recipient(s). It may contain confidential or proprietary information and may be subject to the attorney-client privilege or other confidentiality protections. If this message was misdirected, neither FNC Holding Company, Inc. nor any of its subsidiaries waive any confidentiality, privilege, or trade secrets. If you are not a designated recipient, you may not review, print, copy, retransmit, disseminate, or otherwise use this message. If you have received this message in error, please notify the sender by reply e-mail and delete this message. _______________________________________________ The Web Security Mailing List WebSecurity RSS Feed http://www.webappsec.org/rss/websecurity.rss Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA WASC on Twitter http://twitter.com/wascupdates websecurity@lists.webappsec.org<mailto:websecurity@lists.webappsec.org> http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org -- OWASP ZAP<https://www.owasp.org/index.php/ZAP> Project leader Confidentiality Notice: This message is for the sole use of the intended recipient(s). It may contain confidential or proprietary information and may be subject to the attorney-client privilege or other confidentiality protections. If this message was misdirected, neither FNC Holding Company, Inc. nor any of its subsidiaries waive any confidentiality, privilege, or trade secrets. If you are not a designated recipient, you may not review, print, copy, retransmit, disseminate, or otherwise use this message. If you have received this message in error, please notify the sender by reply e-mail and delete this message.
JD
Jason Drury
Sun, Oct 19, 2014 11:16 AM

This is perfect, thank you!


From: psiinon psiinon@gmail.com
To: Will Jefferies wjefferies@fncinc.com
Cc: Jason Drury druryjason@yahoo.com; websecurity websecurity@lists.webappsec.org
Sent: Wednesday, October 15, 2014 3:53 PM
Subject: Re: [WEB SECURITY] Tools to Reproduce Vulnerabilities?

Thats one of the use cases for Zest:
https://blog.mozilla.org/security/2014/01/20/reporting-web-vulnerabilities-to-mozilla-using-zest/
https://developer.mozilla.org/en-US/docs/zest

Zest is a open source graphical scripting language, and essentially the macro language for ZAP (which is also completely free and open source).

You can very quickly record Zest scripts using ZAP, and graphically edit them to include constructs like conditionals and loops.

Since the Mozilla blog post Zest also supports client side scripting (using Selenium).

At AppSec EU I demoed a client side Zest script which automates registration of Mozilla Persona via Mailinator https://www.youtube.com/watch?v=Ofmp-haNI7s
Other tools such as OWTF have also adopted Zest, and we'd love other tools, both open source and commercial, to adopt it.

Simon

On Wed, Oct 15, 2014 at 9:22 PM, Will Jefferies wjefferies@fncinc.com wrote:

I use an interception proxy when I need to demo vulns for dev.  Fiddler v2 and/or Burpsuite Pro gets the job done nicely.

From:websecurity [mailto:websecurity-bounces@lists.webappsec.org] On Behalf Of Jason Drury
Sent: Wednesday, October 15, 2014 12:15 PM
To: websecurity
Subject: [WEB SECURITY] Tools to Reproduce Vulnerabilities?

All,

Do you use any tool(s) easily reproduce vulnerabilities for developers? I am only aware of Selenium (http://www.seleniumhq.org/). I guess you could also use wget or curl, but I think a gui would be best.

Thanks,
Jason

Confidentiality Notice: This message is for the sole use of the intended recipient(s).  It may contain confidential or proprietary information and may be subject to the attorney-client privilege or other confidentiality protections. If this message was misdirected, neither FNC Holding Company, Inc. nor any of its subsidiaries waive any confidentiality, privilege, or trade secrets. If you are not a designated recipient, you may not review, print, copy, retransmit, disseminate, or otherwise use this message. If you have received this message in error, please notify the sender by reply e-mail and delete this message.


The Web Security Mailing List

WebSecurity RSS Feed
http://www.webappsec.org/rss/websecurity.rss

Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA

WASC on Twitter
http://twitter.com/wascupdates

websecurity@lists.webappsec.org
http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org

--
OWASP ZAP Project leader

This is perfect, thank you! ________________________________ From: psiinon <psiinon@gmail.com> To: Will Jefferies <wjefferies@fncinc.com> Cc: Jason Drury <druryjason@yahoo.com>; websecurity <websecurity@lists.webappsec.org> Sent: Wednesday, October 15, 2014 3:53 PM Subject: Re: [WEB SECURITY] Tools to Reproduce Vulnerabilities? Thats one of the use cases for Zest: https://blog.mozilla.org/security/2014/01/20/reporting-web-vulnerabilities-to-mozilla-using-zest/ https://developer.mozilla.org/en-US/docs/zest Zest is a open source graphical scripting language, and essentially the macro language for ZAP (which is also completely free and open source). You can very quickly record Zest scripts using ZAP, and graphically edit them to include constructs like conditionals and loops. Since the Mozilla blog post Zest also supports client side scripting (using Selenium). At AppSec EU I demoed a client side Zest script which automates registration of Mozilla Persona via Mailinator https://www.youtube.com/watch?v=Ofmp-haNI7s Other tools such as OWTF have also adopted Zest, and we'd love other tools, both open source and commercial, to adopt it. Simon On Wed, Oct 15, 2014 at 9:22 PM, Will Jefferies <wjefferies@fncinc.com> wrote: > > >I use an interception proxy when I need to demo vulns for dev. Fiddler v2 and/or Burpsuite Pro gets the job done nicely. > > >From:websecurity [mailto:websecurity-bounces@lists.webappsec.org] On Behalf Of Jason Drury >Sent: Wednesday, October 15, 2014 12:15 PM >To: websecurity >Subject: [WEB SECURITY] Tools to Reproduce Vulnerabilities? > >All, > >Do you use any tool(s) easily reproduce vulnerabilities for developers? I am only aware of Selenium (http://www.seleniumhq.org/). I guess you could also use wget or curl, but I think a gui would be best. > >Thanks, >Jason > > >Confidentiality Notice: This message is for the sole use of the intended recipient(s). It may contain confidential or proprietary information and may be subject to the attorney-client privilege or other confidentiality protections. If this message was misdirected, neither FNC Holding Company, Inc. nor any of its subsidiaries waive any confidentiality, privilege, or trade secrets. If you are not a designated recipient, you may not review, print, copy, retransmit, disseminate, or otherwise use this message. If you have received this message in error, please notify the sender by reply e-mail and delete this message. >_______________________________________________ >The Web Security Mailing List > >WebSecurity RSS Feed >http://www.webappsec.org/rss/websecurity.rss > >Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA > >WASC on Twitter >http://twitter.com/wascupdates > >websecurity@lists.webappsec.org >http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org > > -- OWASP ZAP Project leader