diff --git a/2023/day15.md b/2023/day15.md
index ee6977b..84e6c94 100644
--- a/2023/day15.md
+++ b/2023/day15.md
@@ -229,5 +229,4 @@ It is between 0 and 10.
-
-On [Day 16](day16.md) we will take a look into "Fuzzing" or Fuzz Testing.
\ No newline at end of file
+On [Day 16](day16.md) we will take a look into "Fuzzing" or Fuzz Testing.
diff --git a/2023/day16.md b/2023/day16.md
index 3d87bfa..fb9dae7 100644
--- a/2023/day16.md
+++ b/2023/day16.md
@@ -91,4 +91,6 @@ It contains the example I used in this article + a fuzz test that triggers a fai
-
- [Fuzzing in Go by Valentin Deleplace, Devoxx Belgium 2022](https://www.youtube.com/watch?v=Zlf3s4EjnFU)
-- [Write applications faster and securely with Go by Cody Oss, Go Day 2022](https://www.youtube.com/watch?v=aw7lFSFGKZs)
\ No newline at end of file
+- [Write applications faster and securely with Go by Cody Oss, Go Day 2022](https://www.youtube.com/watch?v=aw7lFSFGKZs)
+
+On [Day 17](day17.md) Fuzzing Advanced.
diff --git a/2023/day17.md b/2023/day17.md
index cf7f191..328b283 100644
--- a/2023/day17.md
+++ b/2023/day17.md
@@ -14,7 +14,6 @@ However, there are proprietary tools that require a paid license to use them.
That is why for our demonstration today we are going to use a simple open-source CLI written in Go that was inspired by Burp Intruder and provides similar functionality.
It is called [httpfuzz](https://github.com/JonCooperWorks/httpfuzz).
-
## Getting started
This tool is quite simple.
@@ -240,3 +239,5 @@ There are many tools that can help us in fuzzy testing our web applications, bot
[Fuzzing Session: Finding Bugs and Vulnerabilities Automatically](https://youtu.be/DSJePjhBN5E)
[Fuzzing the CNCF Landscape](https://youtu.be/zIyIZxAZLzo)
+
+On [Day 17](day18.md) DAST.