4MMSR-Network Security-2012-2013-comparison of web client side vulnerabilities fuzzers
De Ensiwiki
Révision de 20 mars 2013 à 22:16 par Duchenef (discussion | contributions) (Page créée avec « {{4MMSR-2012-2013-project_template |title=Comparison of web client side fuzzers |references= * [http://webblaze.cs.berkeley.edu/papers/FLAX.pdf FLAX: Systematic Discovery o... »)
Sommaire
Comparison of web client side fuzzers
This is a "mini" research project for the course 4MMSR-Network Security
Keywords
fuzzing,client-side,DOM-XSS
Description
Expected output
Research Questions
- decide considered client side injection flaws, and considered testing tools
- propose a methodology for comparing the performance of such tools
- analyze the results: what are the limitations? why do they occur? how to overcome such limitations?
References
Tools
- Dominator Pro
- FLAX
Results
{{{results}}}
Get Started!
- create an archive on the ensimag server, so that only your team members and I have access to it.
- Créer_une_archive_partagée_avec_Git
- obviously, do not forget to send me the path afterwards