It can be used to discover specific details to help you understand vulnerabilities and exploitability.
cewl -w cewl.lst -d 10 -m 1 http://10.10.10.194