Secure traffic analysis (SSL or TLS protocols) - Check if the request generated by the application is in clear text format.Buffer Overflow - Injecting large random values in the input fields. ![]() File Upload - Malicious file uploading in the application.Input Validation - SQL injection, Command injection, LDAP injection.Dynamic Testing (Proxy setup and Traffic interception, Fuzzing, Injections, etc.) What are the server the client is communicating with application? -> Ģ. ![]() How is the application built -> CFF EXPLORER.Decompiling and Reverse engineering (Binary analysis).Static testing (Local storage and Memory testing).System level testing (Checking for logs, Data files, Registry keys, Process threads).Dynamic Testing (Proxy setup and Traffic interception, Fuzzing, Injections, etc.).Use multiple ports & protocols (SMTP, TCP, HTTP/HTTPS)Įxample: Gtalk, Skype, Tally, ERP Software Web application which accessed from internet through browserĬontinuous communication between Server and Client ![]() Net, Microsoft Silverlight (.exe based)ĭifference between Thick & Thin Client application Thick Clent
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |