Good reference:
# 1. Fuzz exposed endpoints # 2. Analyze misconfigs to gain auth access # 3. Check the list of latest RCEs
Last updated 2 years ago