Before an attack it is necessary to gather as much information as possible about the target system. This step is also known as “enumeration process” or “application mapping”. The goal of enumeration is to get a concrete idea of the structure of the application in order to optimally exploit technical, architectural as well as logical properties of the application for an attack.