Analyzing the attack surface

After you map the content and functionality of your application, you can analyze the attack surface. This enables you to plan your workflow and identify areas that may have vulnerabilities.

To analyze the attack surface, review the contents of the Proxy history and the site map. You can use the following site map features:

Related pages