Using transition diagram.
Configuration for scan using transition diagram.

This section describes a series of steps in performing a web application vulnerability scan using Vex.