This document provides an overview of techniques for going beyond automated vulnerability scanning when performing security assessments. It discusses the importance of reconnaissance, mapping systems and content, and focusing on manual testing techniques like identifying all areas of user input and fuzzing, abusing features, and combining findings from automated tools. The document then provides examples of manual testing techniques, including feature abuse, combining multiple low-risk findings into a high-risk vulnerability, proxy-based firewall bypassing, file inclusion leading to remote code execution, and email spoofing. It emphasizes going beyond just running scans and focusing on manual techniques.