Last updated 1 year ago
Good reference:
# 1. Fuzz exposed endpoints # 2. Analyze misconfigs to gain auth access # 3. Check the list of latest RCEs