Dailydave mailing list archives
Re: sfuzz released
From: yersinia <yersinia.spiros () gmail com>
Date: Tue, 10 Mar 2009 09:40:48 +0100
On Mon, Mar 9, 2009 at 4:43 PM, Aaron <apconole () yahoo com> wrote:
Hello security people, In the course of doing some work at my current place of employment, it has become necessary for us to do some SQA / blackbox testing, and while my first reach may have been SPIKE, alas our SQA folks don't have the time/patience/whatever to be able to build solid cases with it. So, doing what any good doobie does, I wrote a fuzzer that should be able to allow testing of commandline options, network processes, etc, called simple fuzzer. It can be found at http://aconole.brad-x.com/programs/sfuzz.html . It's reminiscent of easyfuzz from priest (whatever happened to those guys?). Hopefully, someone can find some use for it as a first-line fuzzer to be used in conjunction with SPIKE and other fuzzers.
As more and more user begin to use WAF as mod_security and the like (in negative and positive model) fuzzer as sfuzz began to be useless. For example, the core rule of mod_security dropped all the attempt of sfuzz. Just for putting an other eye on the matter. Best Regards
_______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://lists.immunitysec.com/mailman/listinfo/dailydave
Current thread:
- sfuzz released Aaron (Mar 09)
- Re: sfuzz released yersinia (Mar 10)
- Re: sfuzz released Aaron (Mar 10)
- Re: sfuzz released yersinia (Mar 10)
