Process
A simple, secure lifecycle designed to reduce risk quickly.
-
1
Plan
Define scope, assets, constraints, allowed techniques.
-
2
Recon
Enumerate services, endpoints, and attack surface.
-
3
Exploit
Manual testing for auth, input, authz, and logic flaws.
-
4
Report
Write‑ups with impact, repro steps, fixes.
-
5
Retest
Confirm closure and update the attestations.