This Educative document serves as an ethical warning and states that unauthorized exploiting of systems is illegal and punishable by law
It then goes on to discuss Thick Client Penetration Testing, defining it as an application that performs most of its processing locally, unlike Thin Clients that heavily rely on servers.
The document then lists several examples of Thick clients such as Desktop applications, Banking applications, and enterprise apps like SAP and ERP.
The document then lists out various Reconnaissance and analysis techniques with tools required to achieve thick client penetration testing successfully.
This includes technology fingerprinting and local file and folder inspection.
The document ends with a bounty reminder and a happy ethical hacking message.