add line to next day
This commit is contained in:
parent
c547d3640c
commit
107eabbb53
@ -229,5 +229,4 @@ It is between 0 and 10.
|
||||
|
||||
<https://www.aquasec.com/cloud-native-academy/supply-chain-security/sbom/>
|
||||
|
||||
|
||||
On [Day 16](day16.md) we will take a look into "Fuzzing" or Fuzz Testing.
|
||||
On [Day 16](day16.md) we will take a look into "Fuzzing" or Fuzz Testing.
|
||||
|
@ -91,4 +91,6 @@ It contains the example I used in this article + a fuzz test that triggers a fai
|
||||
|
||||
- <https://en.wikipedia.org/wiki/Fuzzing>
|
||||
- [Fuzzing in Go by Valentin Deleplace, Devoxx Belgium 2022](https://www.youtube.com/watch?v=Zlf3s4EjnFU)
|
||||
- [Write applications faster and securely with Go by Cody Oss, Go Day 2022](https://www.youtube.com/watch?v=aw7lFSFGKZs)
|
||||
- [Write applications faster and securely with Go by Cody Oss, Go Day 2022](https://www.youtube.com/watch?v=aw7lFSFGKZs)
|
||||
|
||||
On [Day 17](day17.md) Fuzzing Advanced.
|
||||
|
@ -14,7 +14,6 @@ However, there are proprietary tools that require a paid license to use them.
|
||||
That is why for our demonstration today we are going to use a simple open-source CLI written in Go that was inspired by Burp Intruder and provides similar functionality.
|
||||
It is called [httpfuzz](https://github.com/JonCooperWorks/httpfuzz).
|
||||
|
||||
|
||||
## Getting started
|
||||
|
||||
This tool is quite simple.
|
||||
@ -240,3 +239,5 @@ There are many tools that can help us in fuzzy testing our web applications, bot
|
||||
[Fuzzing Session: Finding Bugs and Vulnerabilities Automatically](https://youtu.be/DSJePjhBN5E)
|
||||
|
||||
[Fuzzing the CNCF Landscape](https://youtu.be/zIyIZxAZLzo)
|
||||
|
||||
On [Day 17](day18.md) DAST.
|
||||
|
Loading…
Reference in New Issue
Block a user