Thick Client Applications
Thick or compiled applications are popular in an enterprise for their internal operations. Legacy thick client applications could have inherent problems waiting to be discovered or rather exploited
Thick or compiled applications are popular in an enterprise for their internal operations. Legacy thick client applications could have inherent problems waiting to be discovered or rather exploited
The main goal of application assessment is to uncover vulnerabilities, to show a practical situation where these flaws can be exploited, and provide recommendation for mitigation of the risks identified. Majority of the times, application assessments are driven by either of these objectives; to obtain unauthorized access and/or to gain unauthorised access to the sensitive information.
Thick clients applications mainly include both server and client side processing information. Legacy applications are known to use proprietary protocols for communication on the wire. Often times these protocols are either designed specially for the thick client or implemented off the shelf. Traditional penetration testing approach won't work to identify vulnerabilities in such applications. A customised approach is required.
Reverse engineering a mobile app is the process of analyzing the compiled app to extract information about its source code. The goal of reverse engineering is to comprehend the code.
Often times thick applications are known to access client side environment, in terms of filesystem and registry. Sensitive data could be written into these locations for the application to use it during its runtime. Process monitoring tools allow gaining insights into the activities performed so that these resources could be accessed for further review.
Communication channel used by the thick client application needs to be intercepted. This is essential to find out the servers that the application is communicating with during the execution phase. This information will be useful during the assessment of the server itself.
The first step of reconnaissance activity includes passively identifying the hosts and services visible on the Internet. This includes limited Open Source Intelligence phase. During red teaming or related offensive security projects, this exercise involves extensive information gathering about a customer's people, processes and technology in use. Research based threat intelligence is an integral part of any offensive exercise.
Overall, the aim of this phase aims to harvest as much information as possible about your organisation that would be used for later phases.
Our reports are comprehensive and include all the evidence that supports our findings. We give you a risk rating that considers how likely an attack is as well as the impact it could have. We don’t create panic scenarios. Our mitigation is detailed, covering both strategic and tactical areas to help our clients prepare a remediation plan.
Apart from the range of commercial and open source tools available for specific testing, our team has its own custom scripts for efficient testing. We provide accurate results to make sure our clients completely understand any vulnerabilities we report.
Our teams are led by veteran security consultants accredited by CREST standards for the last several years. Our experience shows that our clients are best served by giving them the right advice for their cyber security needs. We do not believe in spreading fear, uncertainty and doubt to generate more business.
Much of the manufacturing industry has failed to take proactive steps to defend against cyber attacks—which is a notable problem considering the growing threats the industry faces