diff --git a/2023/day15.md b/2023/day15.md index ee6977b..84e6c94 100644 --- a/2023/day15.md +++ b/2023/day15.md @@ -229,5 +229,4 @@ It is between 0 and 10. - -On [Day 16](day16.md) we will take a look into "Fuzzing" or Fuzz Testing. \ No newline at end of file +On [Day 16](day16.md) we will take a look into "Fuzzing" or Fuzz Testing. diff --git a/2023/day16.md b/2023/day16.md index 3d87bfa..fb9dae7 100644 --- a/2023/day16.md +++ b/2023/day16.md @@ -91,4 +91,6 @@ It contains the example I used in this article + a fuzz test that triggers a fai - - [Fuzzing in Go by Valentin Deleplace, Devoxx Belgium 2022](https://www.youtube.com/watch?v=Zlf3s4EjnFU) -- [Write applications faster and securely with Go by Cody Oss, Go Day 2022](https://www.youtube.com/watch?v=aw7lFSFGKZs) \ No newline at end of file +- [Write applications faster and securely with Go by Cody Oss, Go Day 2022](https://www.youtube.com/watch?v=aw7lFSFGKZs) + +On [Day 17](day17.md) Fuzzing Advanced. diff --git a/2023/day17.md b/2023/day17.md index cf7f191..328b283 100644 --- a/2023/day17.md +++ b/2023/day17.md @@ -14,7 +14,6 @@ However, there are proprietary tools that require a paid license to use them. That is why for our demonstration today we are going to use a simple open-source CLI written in Go that was inspired by Burp Intruder and provides similar functionality. It is called [httpfuzz](https://github.com/JonCooperWorks/httpfuzz). - ## Getting started This tool is quite simple. @@ -240,3 +239,5 @@ There are many tools that can help us in fuzzy testing our web applications, bot [Fuzzing Session: Finding Bugs and Vulnerabilities Automatically](https://youtu.be/DSJePjhBN5E) [Fuzzing the CNCF Landscape](https://youtu.be/zIyIZxAZLzo) + +On [Day 17](day18.md) DAST.