From 4874c5219ebf163d8c83f26e7c57b5cf4cbf5e70 Mon Sep 17 00:00:00 2001 From: Rick M Date: Tue, 25 Feb 2025 09:02:58 -0500 Subject: [PATCH] Tweak ZAP References ZAP left OWASP over year ago, this just adjusts naming. --- trainingportal/static/lessons/redTeam/red_ch2.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/trainingportal/static/lessons/redTeam/red_ch2.md b/trainingportal/static/lessons/redTeam/red_ch2.md index e051fe43..ca9215af 100644 --- a/trainingportal/static/lessons/redTeam/red_ch2.md +++ b/trainingportal/static/lessons/redTeam/red_ch2.md @@ -13,7 +13,7 @@ Your security tests should include the following attack types based on OWASP top 9. Excluded, was part of first challenge - Using Components with Known Vulnerabilities 10. Excluded, not an attack - Insufficient Logging & Monitoring -The following example is using the [OWASP Zed Attack Proxy](https://owasp.org/www-project-zap/) (ZAP). +The following example is using the [Zed Attack Proxy](https://www.zaproxy.org/) (ZAP). 1. Install ZAP. A number of native [installers](https://www.zaproxy.org/download/) are offered, as well as a [docker image](https://www.zaproxy.org/docs/docker/) that allows accessing the UI through your [browser](https://www.zaproxy.org/docs/docker/webswing/) (watch for port conflict on port 8080). 2. Launch ZAP.