Step by step guide to attack surface analysis and mapping using best practices, following correct techniques and using correct tools| IONIX