How to run a active scan attack on URLs from the loaded session?
I try the following commands: zap-cli session load myproject.session
zap-cli open-url https://www.myproject.com
zap-cli context import NewContext.context
zap-cli active-scan --recursive -c "NewContext" --user-name manager1 https://www.myproject.com
But session file not loaded, Can anyone know why and how to fix it ?
Can you try opening the ZAP GUI and then running zap-cli session load myproject.session and seeing if the session is successfully loaded?
Any progress on this? I'm able to open the Zap GUI, load my context, and see it pop up in the UI. For session, nothing happens. My command line just has [DEBUG] Loading session from my.session but nothing shows in the UI. @Grunny
Looks like I just needed to test and check the paths for the files. Going back to ~ and building the path from there helped.