Custom router for browser testing

It's not really about testing, but more about parsing sites through browsers. Nothing new and interesting, except the self-described router-hub and performing nodes.
 
 

Why a hub router?


 
Because it registers in itself the nodes and redirects requests from outside to a particular node.
 
Link to the project repository
 
 

The result is


 
The post turned out to be more like an instruction manual, but nevertheless, I believe that this project can be useful.
 
 

P.S. Some refinements


 
This is the first project that I started writing on GOLANG, so if anyone has suggestions or comments ...[/h][/h][/h]
+ 0 -

The difference between the red, blue and purple teams

The difference between the red, blue and purple teams Hello colleagues. We remind you that not so long ago we had two cool classic books about hacking and analysis of malicious software . And also on the way a great book about the distribution of Kali Linux . Nevertheless, we still believe that the topic of computer security is not completely covered by us and would like to ask your opinion about book Yuri Diogenes and Erdal Ozkaya on the interaction of the Red Team and the Blue Team in the verification of information security in ...
+ 0 -

How to make email-lists and do not mow: practical advice

How to make email-lists and do not mow: practical advice

 
The developer, who first encountered the generation of e-mails, has almost no chance to write an application that will do it correctly. About 40% of emails generated by enterprise applications have some kind of violation of standards, and as a result, problems with delivery and display. There are reasons for this: e-mail is technically much more complicated than the web, mail work is regulated by several hundred standards and an uncountable number of common (and not so) practices, and email clients are diverse and unpredictable. Testing can significantly improve the situation, but there are practically ...
+ 0 -

Pizzeria calculation: Papa Jones, who does not care about the safety of

Pizzeria calculation: Papa Jones, who does not care about the safety of

 
The picture to attract attention is taken here
 
 
Pizza Pope Jones is open in many countries, the site engine is almost always different. Nevertheless, the engine, which was developed somewhere in Russia, is also used on websites for Poland, Kyrgyzstan and Belarus. We will consider it.
 
a mobile site for Russia , for example. Why mobile? Because desktop does not even have a registration form, although this is explained by the fact that registration is automatic when ordering. I decided to check once on how things are with the vulnerabilities.
 
 
Since it...
+ 0 -

On the way to 100% coverage of the code with tests in Go using sql-dumper

On the way to 100% coverage of the code with tests in Go using sql-dumper
 
In this post, I'll talk about how I wrote a console program in the Go language for uploading data from the database to files, trying to cover all the code with tests 100%. I'll start with a description of why I needed this program. I will continue the description of the first difficulties, some of which are caused by the peculiarities of the Go language. Next, I'll mention the assembly on Travis CI, and then I'll tell you about how I wrote the tests, trying to cover the code 100%. A little bit of testing of work with the database and the file system. And in conclusion, I will say about what leads to the ...
+ 0 -

Resistance testing automation

Resistance testing automationDespite the fact that module testing technologies have existed for 30 years (in 1989 Kent Beck wrote the article "Simple Smalltalk Testing: With Patterns"), nevertheless not all programmers own this technology and not all companies have made automatic testing part of their corporate culture . Even despite the obvious advantages of automatic testing, the behavioral resistance is still strong enough. Who tried to implement automatic tests, he knows that there is always some reason why this could not be done.
 
From my personal experience in implementing reliable programming methods in my company...
+ 0 -

BMW Mnemonic for finding boundary values ​​

+ 0 -

Epic fail of the month: rsync as a "vector" on dragging data

Epic fail of the month: rsync as a "vector" on dragging dataInitially I just wanted to throw reference to some comments for the first branch of this article is , as an example, why stick ports out (as for nothing) - is not good.
 
Well and the answer has grown
in the sheet
in this article, and the comment will see one or two people (and so maybe someone useful).
 
It's not about the vulnerability in the literal sense of the word, but about how to overshoot (negligence or laziness) to shoot at the foot immediately long queue.
 
What is actually ...
+ 0 -

On the device of the built-in test functionality in Rust (translation)

Hello, Habr! I present to your attention the translation of the entry "#[test]In 2018" in the blog of John Renner, which can be found here .
 
 
Recently I worked on the implementation of eRFC for custom test frameworks for Rust. Studying the code base of the compiler, I learned the inside of testing in Rust and realized that it would be interesting to share this.
 
how AST represents the identifiers . The name of each function, variable, module, etc. is stored not as a string, but rather as an ...[/test]
+ 0 -

Two you, or an audit with a break-in

As always without names and titles, and since I additionally are bound by the signature of non-disclosure, also with a slightly modified history (and omitting some details, for the publication of which I have not received permission).
 
Below follows the real story of the penetration of the employee's computer well, let's say some private bank. The events described by your humble servant took place in some European country, not so long ago, before DSGVO (GDPR, RGPD), but in the process of its formation, on the eve of so to speak.
 
Actually, everything began with the security audit - , interviews...
+ 0 -