Thick Client Pentest Methodology
Thick Client Penetration Testing Checklist
1. Pre-Engagement
1.1 Scope and Objectives
1.2 Application Information
1.3 Resource Collection
2. Information Gathering
2.1 Installation Analysis
2.2 Configuration Analysis
2.3 Binary Analysis
3. Static Analysis
3.1 Decompilation
3.2 Code Review
4. Dynamic Analysis
4.1 Runtime Monitoring
4.2 Debugging and Hooking
5. Network Communication
5.1 Traffic Interception
5.2 Traffic Analysis
6. Authentication & Session Testing
6.1 Authentication Analysis
6.2 Session Management
7. Local Storage Analysis
7.1 File System
7.2 Memory Analysis
8. Privilege Escalation
8.1 Local Privilege Escalation
9. Post-Exploitation
9.1 Data Extraction
10. Cleanup & Documentation
10.1 Environment Cleanup
10.2 Documentation
11. Quality Assurance
11.1 Verification
Last updated