Attack Surface Discovery

How might we be attacked? Do we have vulnerable configuration? Close windows of opportunity.

Using the same reconnaissance techniques bad actors have access to, we can identify potential weaknesses that

EAM Illustrated