Beginner Ethical Hacking Projects Using Kali Linux and OWASP ZAP

Entering the field of cybersecurity requires moving from theory to application. The most effective way to build a professional-grade portfolio is by performing controlled penetration tests against intentionally vulnerable applications.

Legal and Ethical Disclaimer: All testing must occur in an isolated Virtual Machine (VM) environment. Never perform these exercises against live websites or public infrastructure. Recommended targets for these projects include OWASP Juice Shop, DVWA (Damn Vulnerable Web Application), or isolated containers on VulnHub.

Project 1: Automated Web Application Vulnerability Scanning

The objective is to master the automated reconnaissance phase of a penetration test. OWASP ZAP (Zed Attack Proxy) is an industry-standard tool that acts as a “man-in-the-middle,” sitting between your browser and the target application to intercept and analyze traffic.

Workflow:

  1. Configure the Proxy: In Kali Linux, open ZAP. Go to Tools Options Network Local Servers/Proxies and set it to listen on 127.0.0.1:8080. Configure your browser
Read More