Thick Client Pentest Methodology

Thick Client Penetration Testing Checklist

1. Pre-Engagement

1.1 Scope and Objectives

1.2 Application Information

1.3 Resource Collection

2. Information Gathering

2.1 Installation Analysis

2.2 Configuration Analysis

2.3 Binary Analysis

3. Static Analysis

3.1 Decompilation

3.2 Code Review

4. Dynamic Analysis

4.1 Runtime Monitoring

4.2 Debugging and Hooking

5. Network Communication

5.1 Traffic Interception

5.2 Traffic Analysis

6. Authentication & Session Testing

6.1 Authentication Analysis

6.2 Session Management

7. Local Storage Analysis

7.1 File System

7.2 Memory Analysis

8. Privilege Escalation

8.1 Local Privilege Escalation

9. Post-Exploitation

9.1 Data Extraction

10. Cleanup & Documentation

10.1 Environment Cleanup

10.2 Documentation

11. Quality Assurance

11.1 Verification

Last updated