analysis of its algorithmized representation obtained with the help of an utility being a part of
the method. Vulnerability search falls within the field of telecommunication devices. Phase-
by-phase description of the method is discussed, as well as the software architecture of the
utility and their limitations in terms of application and preliminary effectiveness estimate
results. A forecast is given as to developing the method and the utility in the near future.