-
-
Notifications
You must be signed in to change notification settings - Fork 134
HelpAddonsInvokeOptions
This screen allows you to configure the applications that can be invoked. By default there are no applications available, you need to add all of the applications that you want to use.
The name that will be used for this application in ZAP.
The full path of the application you want to invoke. Only one command can be specified. If you want to run multiple commands in one go, or set up environmental variables, then you should create a script or batch file and then invoke this from ZAP.
The parameters that ZAP should pass to the command. The following tags may be used to pass parameters:
%url% | the full url, e.g. 'http://localhost/test?a=b' | |
%site% | the site, e.g. 'http://localhost:8080/' | |
%host% | the hostname, e.g. 'localhost' | |
%port% | the port, e.g. '80' | |
%cookie% | the first cookie field from the request header (if any) | |
%postdata% | the POST data sent, if any, with any newlines replaced with "\n" |
So if a command accepted a URL using '-u' you would specify the parameters as: '-u %url%'
If checked then the command run and any output it generates will be displayed on the Output tab. You should always use this options when running scripts or commands that do not have a UI. You can also use this options for troubleshooting - if an application does not run as expected then copy the command run and try it from a command line prompt.
If checked then any output will be appended to a Note attached to the relevant History tab record. Note that some nodes in the Sites tab do not have associated History tab records - for those nodes this option will have no effect.
-
ZAP User Guide
- Introduction
-
Getting Started
- Configuring proxies
-
Features
- Active Scan
- Add-ons
- Alerts
- Anti CSRF Tokens
- API
- Authentication
- Break Points
- Callbacks
- Contexts
- Data Driven Content
- Filters
- Globally Excluded URLs
- HTTP Sessions
- Man-in-the-middle Proxy
- Modes
- Notes
- Passive Scan
- Scan Policies
- Scope
- Session Management
- Spider
- Statistics
- Structural Modifiers
- Structural Parameters
- Tags
- Users
- Scanner Rules
- A Simple Penetration Test
-
The User Interface
- Overview
- The Top Level Menu
- The Top Level Toolbar
- The Tabs
-
The Dialogs
- Active Scan
- Add Alert
- Add Break Point
- Add Note
- Encode/Decode/Hash
- Filter
- Find
- History Filter
- Manual Request Editor
- Manage Add-ons
- Manage Tags
-
Options
- Active Scan
- Active Scan Input Vectors
- Alerts
- Anti CSRF Tokens
- API
- Breakpoints
- Callback Address
- Certificate
- Check for Updates
- Connection
- Database
- Display
- Dynamic SSL Certificates
- Extensions
- Global Exclude URL
- HTTP Sessions
- JVM
- Keyboard
- Language
- Local Proxies
- Passive Scan Rules
- Passive Scan Tags
- Passive Scanner
- Rule Configuration
- Scripts
- Search
- Spider
- Statistics
- Persist Session
- Resend
- Scan Policy Manager
- Scan Progress
- Session
- Spider
- The Footer
- Command Line
- Add Ons
- Releases
- Paros Proxy
- Credits