README.rdoc in tarantula-0.2.0 vs README.rdoc in tarantula-0.3.3
- old
+ new
@@ -105,29 +105,28 @@
for URLs matching a given regex:
t = tarantula_crawler(self)
t.allow_404_for %r{/users/\d+/}
-== Custom Attack Handlers
+== Testing for Common Attacks
You can specify the attack strings that Tarantula throws at your application.
def test_tarantula
t = tarantula_crawler(self)
- Relevance::Tarantula::AttackFormSubmission.attacks << {
+ Relevance::Tarantula::FormSubmission.attacks << {
:name => :xss,
:input => "<script>gotcha!</script>",
:output => "<script>gotcha!</script>",
}
- Relevance::Tarantula::AttackFormSubmission.attacks << {
+ Relevance::Tarantula::FormSubmission.attacks << {
:name => :sql_injection,
:input => "a'; DROP TABLE posts;",
}
t.handlers << Relevance::Tarantula::AttackHandler.new
- t.fuzzers << Relevance::Tarantula::AttackFormSubmission
t.times_to_crawl = 2
t.crawl "/posts"
end
This example adds custom attacks for both SQL injection and XSS. It also tells Tarantula to crawl the