Thick Client (Desktop) Application Penetration Testing – Part-1

Thick Client (Desktop) Application Penetration Testing - Part-1

INFORMATION GATHERING Using the tool CFF Explorer Using the SysInternal Suites Let’s start … Using the Tool Wireshark Using the Tool ProcMon (Login Credentials in Registry Entry) TRAFFIC ANALYSIS Traffic Analysis using Wireshark Filter technique 1 Filter technique 2 Using Tool Echo Mirage

Thick Client (Desktop) Application Penetration Testing

thick-client-desktop-application-penetration-testing

Introduction Thick client (Desktop) application penetration testing is the process of evaluating the security of a thick client application by simulating attacks to identify vulnerabilities. A thick client application, also known as a fat client, is a software program that runs on a local machine and communicates with a server or a database to perform … Read more

Most useful Linux network commands

most useful Linux Network Commands

Linux Network Commands: In the world of networking, having the right tools at your disposal can mean the difference between a smooth, seamless connection & a frustrating, time-consuming experience. While there are plenty of GUI-based network tools out there, seasoned Linux users know that the command line is often the best place to turn when … Read more

Docker Improper Write Permissions

docker improper write permissions for volumes and host filesystems

Greetings fellow Docker enthusiasts! Have you ever come across a pesky issue with docker improper write permissions for volumes & host filesystems when deploying your containers? If so, you’re not alone. This is a common problem that many Docker users face and it can be frustrating trying to figure out how to resolve it. But … Read more