mirror of
https://github.com/fuzzdb-project/fuzzdb.git
synced 2025-02-17 00:38:24 +00:00
Update README.md for GH move
This commit is contained in:
parent
c790478e85
commit
9aae3078b3
1 changed files with 6 additions and 6 deletions
12
README.md
12
README.md
|
@ -2,17 +2,17 @@ fuzzdb is the most comprehensive Open Source database of malicious inputs, predi
|
|||
|
||||
# Download #
|
||||
|
||||
**Preferred method is to check out sources via svn, since new payloads are added frequently**
|
||||
**Preferred method is to check out sources via gt, since new payloads are added frequently**
|
||||
```
|
||||
svn checkout http://fuzzdb.googlecode.com/svn/trunk/ fuzzdb-read-only
|
||||
git clone git@github.com:fuzzdb-project/fuzzdb.git fuzzdb
|
||||
```
|
||||
|
||||
While in the fuzzdb dir, you can update your local repo with the command
|
||||
```
|
||||
svn update
|
||||
git pull
|
||||
```
|
||||
|
||||
You can also browse the [fuzzdb svn repo sources](http://code.google.com/p/fuzzdb/source/browse/#svn/trunk).
|
||||
You can also browse the [fuzzdb github sources](https://github.com/fuzzdb-project/fuzzdb/tree/master).
|
||||
|
||||
|
||||
# What's in fuzzdb? #
|
||||
|
@ -26,7 +26,7 @@ Categorized by platform, language, and attack type, malicious and malformed inpu
|
|||
FuzzDB contains comprehensive lists of [attack payloads](http://code.google.com/p/fuzzdb/source/browse/#svn/trunk/attack-payloads) known to cause issues like OS command injection, directory listings, directory traversals, source exposure, file upload bypass, authentication bypass, http header crlf injections, and more.
|
||||
|
||||
**Response Analysis -**
|
||||
Since system responses also contain predictable strings, fuzzdb contains a [set of regex pattern dictionaries](http://code.google.com/p/fuzzdb/wiki/regexerrors) such as interesting error messages to aid detection software security defects, lists of common Session ID cookie names, and more.
|
||||
Since system responses also contain predictable strings, fuzzdb contains a [set of regex pattern dictionaries](https://github.com/fuzzdb-project/fuzzdb/wiki/regexerrorss) such as interesting error messages to aid detection software security defects, lists of common Session ID cookie names, and more.
|
||||
|
||||
**Other useful stuff -**
|
||||
Webshells, common password and username lists, and some handy wordlists.
|
||||
|
@ -59,7 +59,7 @@ FuzzDB is like an open source web application security scanner, without the scan
|
|||
|
||||
# How to Use fuzzdb #
|
||||
|
||||
* The most immediate, hands-on way is to use they payload files for web security testing with Burp Proxy's [intruder](http://portswigger.net/intruder/) module. The regex/errors.txt file can be loaded to [pattern match the server responses](http://code.google.com/p/fuzzdb/wiki/regexerrors).
|
||||
* The most immediate, hands-on way is to use they payload files for web security testing with Burp Proxy's [intruder](http://portswigger.net/intruder/) module. The regex/errors.txt file can be loaded to [pattern match the server responses](https://github.com/fuzzdb-project/fuzzdb/wiki/regexerrors).
|
||||
|
||||
* Use the patterns to test web services.
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue