Skip to content
_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN DE
Let's talk

DAST Tools — Dynamic Analysis

27. 02. 2024 1 min read intermediate

DAST tests a running application from the outside — like an attacker. It finds runtime vulnerabilities that SAST cannot see.

OWASP ZAP

Docker — automatic scan

docker run -t ghcr.io/zaproxy/zaproxy:stable zap-baseline.py \ -t https://target.com -r report.html

Full scan

docker run -t ghcr.io/zaproxy/zaproxy:stable zap-full-scan.py \ -t https://target.com

Nuclei

Installation

go install github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latest

Scanning

nuclei -u https://target.com -t cves/ nuclei -u https://target.com -t vulnerabilities/

CI/CD

GitHub Actions — ZAP baseline

  • name: ZAP Scan uses: zaproxy/[email protected] with: target: ‘https://staging.example.com’

Key Takeaway

DAST = testing a running application. ZAP for web apps, Nuclei for infra. Combine with SAST for complete coverage.

securitydasttestingzap
Share:

CORE SYSTEMS team

We build core systems and AI agents that keep operations running. 15 years of experience with enterprise IT.