Fluid Attacks logo
Login
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO
Cucumber lot

Gherkin on steroids

How to document detailed attack vectors
How to use Gherkin to document attack vectors in vulnerable applications using more advanced keywords from the Gherkin syntax. We propose a template to be used in the static and dynamic detection and exploitation of vulnerable applications. Follow-up to a previous entry with Gherkin basics.
User icon Rafael Ballestas
Folder icon documentation
Calendar icon

2018-03-13




Author picture

Rafael Ballestas



Related




Service status - Terms of Use