Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Flowchart

Start

Input Target Website

Resolve IP Address

Use the menu button and


Search for items
Scan Target Network navigate to the category

Analyze Network
Traffic

Scan for Web


Vulnerabilities

Perform Intrusion
Detection

Analyze Logs |

Generate Report

Analyze Logs |

Perform
Run
Offensive
no yes Penetration yes Simulate Attack
Security
Test?
Actions?

Detect Anomalies

End no

Simulate Attack

End
End

Detect Anomalies

Run Web
Vulnerability Scan

Run SQL Injection


Scan

Run XSS Scan

Run AI Offensive
Security

End

You might also like