- See first-hand how attackers exploit vulnerabilities and the impact they pose
- Fix vulnerabilities in a way that retains the application’s functionality
- Experiment by modifying code or configurations, observing the impact on exploit attempts, and impact on application functionality