Open Source Analysis – Utilize search engine modifiers to identify hosts, application versions, and implementation strategies for similar web applications
Network Mapping & Discovery – Identify services, applications, and vulnerabilities within an infrastructure to aid in understanding targets and detecting protection mechanisms
Application Mapping, Fingerprinting & Enumeration – Map hosts and web applications, determine the application footprint, create an application life cycle and analyze the source code
Application Vulnerability Identification, Exploitation & Analysis (Web, Web API, or Mobile) – Attempt vulnerability identification (both automated and manual) and exploitation of the application, focusing on the OWASP Top Ten vulnerability categories, and analyze the risk of identified vulnerabilities by demonstrating attacks