Good reference:
Last updated 1 year ago
# 1. Fuzz exposed endpoints # 2. Analyze misconfigs to gain auth access # 3. Check the list of latest RCEs