O'Reilly logo

Fuzzing: Brute Force Vulnerability Discovery by Pedram Amini, Adam Greene, Michael Sutton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Web Application and Server Fuzzing: Automation

 

“The most important thing is for us to find Osama bin Laden. It is our number one priority and we will not rest until we find him.”

 
 --George W. Bush, Washington, DC, September 13, 2001
 

“I don’t know where bin Laden is. I have no idea and really don’t care. It’s not that important. It’s not our priority.”

 
 --George W. Bush, Washington, DC, March 13, 2002

Now that we’ve discussed how Web applications could be fuzzed, it’s time to put our theories to the test. In this chapter, we take what we learned in the background chapter and apply it by developing WebFuzz, a graphical Web application fuzzer. We start by planning the design of the application and identifying any unique challenges that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required