Introduction

What?

Recon strategies for gathering intel on a target.

Why?

To discover all the possible ways of attacking a target before deciding on the most effective approach for web application hacking.

How?