Summary

  • This Educative document serves as an ethical warning and states that unauthorized exploiting of systems is illegal and punishable by law
  • It then goes on to discuss Thick Client Penetration Testing, defining it as an application that performs most of its processing locally, unlike Thin Clients that heavily rely on servers.
  • The document then lists several examples of Thick clients such as Desktop applications, Banking applications, and enterprise apps like SAP and ERP.
  • The document then lists out various Reconnaissance and analysis techniques with tools required to achieve thick client penetration testing successfully.
  • This includes technology fingerprinting and local file and folder inspection.
  • The document ends with a bounty reminder and a happy ethical hacking message.

By Ajay Naik

Original Article