add line to next day

This commit is contained in:
bruno.sanches 2023-02-17 17:23:38 -03:00
parent c547d3640c
commit 107eabbb53
3 changed files with 6 additions and 4 deletions

View File

@ -229,5 +229,4 @@ It is between 0 and 10.
<https://www.aquasec.com/cloud-native-academy/supply-chain-security/sbom/> <https://www.aquasec.com/cloud-native-academy/supply-chain-security/sbom/>
On [Day 16](day16.md) we will take a look into "Fuzzing" or Fuzz Testing.
On [Day 16](day16.md) we will take a look into "Fuzzing" or Fuzz Testing.

View File

@ -91,4 +91,6 @@ It contains the example I used in this article + a fuzz test that triggers a fai
- <https://en.wikipedia.org/wiki/Fuzzing> - <https://en.wikipedia.org/wiki/Fuzzing>
- [Fuzzing in Go by Valentin Deleplace, Devoxx Belgium 2022](https://www.youtube.com/watch?v=Zlf3s4EjnFU) - [Fuzzing in Go by Valentin Deleplace, Devoxx Belgium 2022](https://www.youtube.com/watch?v=Zlf3s4EjnFU)
- [Write applications faster and securely with Go by Cody Oss, Go Day 2022](https://www.youtube.com/watch?v=aw7lFSFGKZs) - [Write applications faster and securely with Go by Cody Oss, Go Day 2022](https://www.youtube.com/watch?v=aw7lFSFGKZs)
On [Day 17](day17.md) Fuzzing Advanced.

View File

@ -14,7 +14,6 @@ However, there are proprietary tools that require a paid license to use them.
That is why for our demonstration today we are going to use a simple open-source CLI written in Go that was inspired by Burp Intruder and provides similar functionality. That is why for our demonstration today we are going to use a simple open-source CLI written in Go that was inspired by Burp Intruder and provides similar functionality.
It is called [httpfuzz](https://github.com/JonCooperWorks/httpfuzz). It is called [httpfuzz](https://github.com/JonCooperWorks/httpfuzz).
## Getting started ## Getting started
This tool is quite simple. This tool is quite simple.
@ -240,3 +239,5 @@ There are many tools that can help us in fuzzy testing our web applications, bot
[Fuzzing Session: Finding Bugs and Vulnerabilities Automatically](https://youtu.be/DSJePjhBN5E) [Fuzzing Session: Finding Bugs and Vulnerabilities Automatically](https://youtu.be/DSJePjhBN5E)
[Fuzzing the CNCF Landscape](https://youtu.be/zIyIZxAZLzo) [Fuzzing the CNCF Landscape](https://youtu.be/zIyIZxAZLzo)
On [Day 17](day18.md) DAST.