Watch this video on YouTube
What is the common testing approach used to examine the vulnerability of input interfaces?