Analyzing attack results

You can use the following functions to analyze results and identify interesting requests:

Related pages