Searching protocol for "tech-fingerprint"
Identify target technologies and vulnerabilities.
Map web app attack surfaces and endpoints.