header bg

Scan QR code or get instant email to install app

Question:

When an attacker has partial knowledge of inner-workings of the application, what type of analysis is performed?

A Grey-box
explanation

Related Information