/adtech_analysis

Analyze output of OWASP Zap interceptiong proxy to uncover hidden data-sharing networks

Primary LanguageRGNU General Public License v3.0GPL-3.0

adtech_analysis

Analyze output of OWASP ZAP intercepting proxy to uncover hidden data-sharing networks.

Instructions

Follow Bill Fitzgerald's Information Security Primer for Evaluating Educational Software to use ZAP to generate proxy logs. Save the log for each individual site to a text file named siteimanalyzing.txt. Put all textfiles in the sources folder.

Once you have the proxy logs you want to analyze, open intercepted_urls.R in RStudio. Set the working directory to the folder containing that script. Then run the entire script. It will produce a master database (CSV file) and a number of summary tables in the results folder, and both a heat map and a network analysis in the plots folder.

Repository contains a handful of data files so you can test the script, and see the kind of output that ZAP produces.