Understand thick client architecture (two-tier vs. three-tier) and identify technologies, frameworks, and libraries in use.
Map network communication, protocols, and application processes; analyze security mechanisms (authentication, authorization, sessions).
Test GUI for object permissions, logic flaws, access control bypass, injection vulnerabilities, and privilege escalation.
Perform file, folder, and registry testing for permissions, sensitive data, and manipulation attacks (DLL preloading, race conditions, etc.).
Analyze binaries for security protections (ASLR, DEP, SafeSEH, etc.), memory manipulation, and runtime attacks.
Intercept and manipulate network and end-to-end traffic; perform MITM and protocol analysis.
Apply OWASP Top 10 (Web & API) to thick clients, exploit DLL hijacking, and use automated tools for static/dynamic analysis.
Hands-on with tools: CFF Explorer, PEid, Detect It Easy, dnSpy, Sysinternals Suite, Procmon, Process Explorer, WinSpy++, Regshot, Wireshark, Burp Suite, PESecurity, HxD, and more.
This course focuses on desktop/thick client application security. You'll learn to instrument applications, intercept/modify traffic even for custom protocols, and perform static, dynamic and runtime analysis to uncover vulnerabilities.
We dig into DLL hijacking, encryption/storage checks, hardcoded secrets, registry and file permission issues, and session management. You'll build a repeatable test plan mapped to OWASP guidance and produce actionable reports.
