Preparation
Footprinting
Initial scanning
Canopy of apple-blossom
API Mayhem
Head in the clouds
Pocketful of acorns
Recon strategies for gathering intel on a target.
To discover all the possible ways of attacking a target before deciding on the most effective approach for web application hacking.
Manually walk through the target
Scope discovery
Other sneaky OSINT techniques
Tech stack fingerprinting