1 Information Gathering
1.1 Conduct Search Engine Discovery Reconnaissance for Information Leakage
1.3 Review Webserver Metafiles for Information Leakage
1.4 Enumerate Applications on Webserver
1.5 Review Web Page Content for Information Leakage
1.6 Identify Application Entry Points
1.7 Map Execution Paths Through Application
1.8 Fingerprint Web Application Framework