Identify Vulnerabilities in Perimeter ()