1 Information Gathering
1.1 Conduct Search Engine Discovery Reconnaissance for Information Leakage
1.3 Review Webserver Metafiles for Information Leakage
1.4 Attack Surface Identification
1.5 Review Web Page Content for Information Leakage
1.6 Identify Application Entry Points
1.7 Map Execution Paths Through Application
1.8 Fingerprint Web Application Framework