Is there any way to create a scan policy for passive scans? I know you can create and modify scan policies for the active/attack scanning, but i'm wondering if you can do the same for the passive scan rules or if you have to individually modify them on every machine?
相关问题
- Selenium and Cucumber proxy setting (cucumber.xml
- Automate OAuth access token for Zed Attack Proxy S
- How to prevent XSS for the form action URL?
- Configure Zap Attack as a system wide proxy
- OWASP ZAP reported “alert(1);” XSS vulnera
There's an existing ticket open to unify Active/Passive Scan handling in a singular policy type interface: https://github.com/zaproxy/zaproxy/issues/3870. If you're really interested in that you could support it on BountySource (https://www.bountysource.com/issues/49047644-improved-active-passive-rules-management) and see if that draws some attention/action.
Another option you could go with is to create a quick script that uses ZAP's web API to apply a Passive Scan rule "policy". Relevant endpoints include: pscan/view/scanners/, pscan/action/disableAllScanners/, pscan/action/enableScanners/. Here's a python example:
Finally you could configure ZAP on one system, then copy that
config.xml
to other systems as needed.