Skip to content

Analyze the Application

Nirvana EL edited this page Jan 14, 2023 · 2 revisions
  • 2.1 Identify Functionality
  • 2.2 Identify Data Entry Points
  • 2.3 Identify the Technologies Used
  • 2.4 Map the Attack Surface
Clone this wiki locally