Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
BFuzz is a tool designed for input-based fuzzing that utilizes HTML as its source input, launching a new instance of your browser to execute various test cases created by the domato generator located in the recurve directory. In addition, BFuzz automates the process by repeatedly performing the same operations without altering any of the test cases. When you run BFuzz, it prompts you to choose between fuzzing Chrome or Firefox; however, it specifically opens Firefox from the recurve directory and generates logs in the terminal. This lightweight script facilitates the opening of a browser and the execution of test cases, which are systematically generated by the domato tool and include the main scripting functionality. Furthermore, the script incorporates supplementary helper code that is essential for effective DOM fuzzing, enhancing the overall testing process. Its streamlined design makes it an efficient choice for developers looking to perform thorough web application testing.
Description
Fuzz testing, commonly referred to as fuzzing, is a technique used in software testing that aims to discover implementation errors by injecting malformed or semi-malformed data in an automated way. For example, consider a scenario involving an integer variable within a program that captures a user's selection among three questions; the user's choice can be represented by the integers 0, 1, or 2, resulting in three distinct cases. Since integers are typically stored as fixed-size variables, a failure to implement the default switch case securely could lead to program crashes and various traditional security vulnerabilities. Fuzzing serves as an automated method for uncovering software implementation issues, enabling the identification of bugs when they occur. A fuzzer is a specialized tool designed to automatically inject semi-random data into the program stack, aiding in the detection of anomalies. The process of generating this data involves the use of generators, while the identification of vulnerabilities often depends on debugging tools that can analyze the program's behavior under the influence of the injected data. These generators typically utilize a mixture of established static fuzzing vectors to enhance the testing process, ultimately contributing to more robust software development practices.
API Access
Has API
API Access
Has API
Pricing Details
Free
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
RootUp
Website
github.com/RootUp/BFuzz
Vendor Details
Company Name
OWASP
Country
United States
Website
owasp.org/www-community/Fuzzing