header bg

Question:

When an attacker has partial knowledge of inner-workings of the application, what type of analysis is performed?

A Grey-box
Explaination