BEST
Web hacking and snooping analysis (breach response) using open source tools
You can learn about the functional utilization of OWASP-ZAP, a web proxy required for running web services, and the virtual environment image Security Onion for analyzing breach response according to attack patterns.





