docs: add lab5 submission - SAST/multi-approach DAST security analysis (Post Zap Fix)#8
Merged
docs: add lab5 submission - SAST/multi-approach DAST security analysis (Post Zap Fix)#8
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Goal
Perform Static Application Security Testing (SAST) using Semgrep and Dynamic Application Security Testing (DAST) using ZAP, Nuclei, Nikto, and SQLmap against OWASP Juice Shop v19.0.0. Identify, compare, and correlate vulnerabilities across both approaches to demonstrate comprehensive DevSecOps security coverage.
Changes
labs/submission5.mdFull analysis report covering SAST findings, DAST multi-tool comparison, and SAST/DAST correlation with security recommendationslabs/lab5/semgrep/semgrep-results.jsonβ Semgrep JSON output (25 findings across 1,014 files)labs/lab5/semgrep/semgrep-report.txtβ Human-readable Semgrep reportlabs/lab5/zap/report-noauth.htmlβ ZAP unauthenticated baseline scan reportlabs/lab5/zap/report-auth.htmlβ ZAP authenticated scan reportlabs/lab5/zap/zap-report-noauth.jsonβ ZAP unauthenticated results (JSON)labs/lab5/nuclei/nuclei-results.jsonβ Nuclei template scan results (25 matches)labs/lab5/nikto/nikto-results.txtβ Nikto web server scan results (84 findings)labs/lab5/sqlmap/β SQLmap output confirming boolean-based blind SQLi on search endpointlabs/lab5/analysis/sast-analysis.txtβ SAST summary analysislabs/lab5/analysis/correlation.txtβ SAST/DAST correlation reportTesting
p/security-auditandp/owasp-top-tenrule packs against cloned Juice Shop v19.0.0 source (1,014 files scanned)curl -s http://localhost:3000before all DAST scans/rest/user/loginbefore authenticated scan-ut) againsthttp://localhost:3000/rest/products/search?q=*with SQLmap boolean-based blind technique; DBMS identified as SQLitecompare_zap.shandsummarize_dast.shto aggregate cross-tool resultsArtifacts & Screenshots
labs/lab5/zap/report-auth.htmlβ Full ZAP authenticated scan report with alert detailslabs/lab5/zap/report-noauth.htmlβ ZAP unauthenticated baseline for comparisonlabs/lab5/nuclei/nuclei-results.jsonβ Nuclei JSONL results including Prometheus metrics exposure findinglabs/lab5/nikto/nikto-results.txtβ Nikto output confirming FTP directory access and missing headerslabs/lab5/sqlmap/β SQLmap session files with confirmed payload:') AND 3692=3692 AND ('DEov' LIKE 'DEovlabs/lab5/analysis/correlation.txtβ Cross-tool finding counts summaryChecklist