Dynamic Application Security Testing (DAST)
The Authentication Bypass SAST Never Found
// middleware/auth.ts
export function requireAuth(req, res, next) {
// Skip auth in debug mode for easier testing
if (req.query.debug === 'true') {
return next(); // β MASSIVE VULNERABILITY
}
// ... normal auth checks
}What You'll Learn
What is DAST?
SAST vs DAST Comparison
Setting Up DAST: OWASP ZAP
Basic ZAP Scan in GitLab CI/CD
Custom ZAP Scan with Docker
Authenticated Scanning
Method 1: Form-Based Authentication
Method 2: JWT Token Authentication
Method 3: Session Cookie
Real Vulnerability Examples
Example 1: Authentication Bypass (The Valentine's Day Gift)
Example 2: Insecure Direct Object Reference (IDOR)
Example 3: Missing Security Headers
Example 4: SSL/TLS Configuration Issues
API Security Testing with ZAP
OpenAPI/Swagger Scan
GraphQL API Scan
Optimizing DAST Performance
1. Scan Depth Configuration
2. Scope Limiting
3. Scheduled Comprehensive Scans
Managing DAST Findings
Risk Prioritization
Suppressing False Positives
Real Results
Findings (First 6 Months)
Impact
Key Takeaways
What's Next
PreviousStatic Application Security Testing (SAST)NextInteractive Application Security Testing (IAST) and Runtime Protection
Last updated