Table of Contents
- Getting Started with OWASP Zed Attack Proxy
- Navigating the UI
- Configuring, Crawling, Scanning, and Reporting
- Authentication and Authorization Testing
- Testing of Session Management
- Validating (Data) Inputs - Part 1
- Validating (Data) Inputs - Part 2
- Business Logic Testing
- Client-Side Testing
- Advanced Attack Techniques
- Advanced Adventures with ZAP

