List of some known vulnerabilities we might found in Thick Client application. Identifying common vulnerabilities like languages and frameworks. Understanding the core security mechanisms used by the application.ĥ. Identifying all the different entry points for user input.Ĥ. Figuring out the application’s functionality and behavior.ģ. Discovering what technologies are being used on both the client and the server sides.Ģ. □□The first step to take when facing a thick client application is to gather information, such as:ġ. (ii) Non-Proxy based thick client (Common). In Thick Client, there are two types (i) Proxy-based Thick clients. Thick Client Pentest is complicated as compared to Web/API Pentest in my opinion. How to test thick client applications? □□ Microsoft Outlook, Yahoo Messenger, and Skype are some thick client application examples.A thick client is a software that does not need a connection to a server system to operate.
0 Comments
Leave a Reply. |