Analyze output of OWASP ZAP intercepting proxy to uncover hidden data-sharing networks.
Follow Bill Fitzgerald's Information Security Primer for Evaluating Educational Software to use ZAP to generate proxy logs. Save the log for each individual site to a text file named siteimanalyzing.txt
. Put all textfiles in the sources
folder.
Once you have the proxy logs you want to analyze, open intercepted_urls.R
in RStudio. Set the working directory to the folder containing that script. Then run the entire script. It will produce a master database (CSV file) and a number of summary tables in the results
folder, and both a heat map and a network analysis in the plots
folder.
Repository contains a handful of data files so you can test the script, and see the kind of output that ZAP produces.