In recent years, we have observed an explosive development of the electronic industry. It made it possible to bring information and communication technologies (ICT) to a new level, which have found wide application in all spheres of human activity, entered his deep personal space.
Like all innovations created by man for man's sake, ICT, of course, does not always fall into clean hands. Volumes of data stored in digital form on servers, computers or mobile phones have reached critical levels not only for simple users, but also for companies and even entire states! These data are collected by everyone who has such an opportunity. Some people want to learn more about the shortcomings and vulnerabilities of their software product in order to eliminate them.