Overview
NOTE: The Windows 10 and Metasploitable VMs should be running.
In this exercise, you’ll scan a web application for vulnerabilities using Zed Attack Proxy.
In this exercise, you’ll scan a web application for vulnerabilities using Zed Attack Proxy.