We first crawls the target application then we sends various inputs into the parameters of the pages and looks for specific web vulnerabilities such as SQL Injection, Cross-Site Scripting, Local File Inclusion, OS Command Injection, and many more. Furthermore, we also attempt to detect sensitive files from the server like backup files, old files, admin interfaces, archive files, etc.