Good reference:
Last updated 3 years ago
Was this helpful?
# 1. Fuzz exposed endpoints # 2. Analyze misconfigs to gain auth access # 3. Check the list of latest RCEs