Methodology
Things we want to find out
Part 1: Apex domains, subdomains, applications and technologies
What domains & subdomains are in scope?
What technologies exist
Part 2: Application attack surface
What endpoints exist
What functionality exists
Checklist
Part 1: Initial Discovery
Domain Reconnaissance
Technology Stack Identification
Infrastructure Mapping
Part 2: Application Analysis
Endpoint Discovery
Functionality Mapping
Content Analysis
Security Control Analysis
Integration Points
Documentation
Continuous Discovery
Last updated