CLIENT PENETRATION TESTING METHODOLOGY
MAPPING AND SERVICE IDENTIFICATION
RECONNAISSANCE AND ENUMERATION
SCANNING
VULNERABILITY IDENTIFICATION & PATCH VERIFICATION
POST EXPLOITATION
STRATEGIC MITIGATION
A holistic approach to perform thick client penetration test that not only discovers security vulnerabilities, but also finding business logic vulnerabilties along with security checklists based on industry standards, including OWASP Top Ten, PCI Compliance, and NIST 800-53.
ADVANTAGES WITH SGL
Benefits of a penetration testing performed by SGL include:
DETAILS
Identifying every details to abuse or find attack surfaces in the application. Insight of the application can be used to find ciritcal vulnerabilties.
VULNERABILITIES
Identifying the vulnerability in the application. Prioritize high risk vulnerability and provide strategically plan to fix the vulnerability.
GET COMPLIANT
After performing patch verification, show customers, stakeholders your commitment towards security, and protecting important assets.
What is thick client penetration testing ?
OWASP top ten vulnerability standard followed to find vulnerabilities along with SGL test cases for the thick client penetration testing.
- Beyond XSS with Business Logic Errors, Code Injection
- Remote Code Execution
- SQL Injection
- XML External Entities (XXE) Injection
- Privilege Escalation, SSRF, and IDOR
- Race condition Vulnerability
- Session Management vulnerabilities
- Cross-Site Request Forgery (CSRF)
- Java, .NET Deserialization vulnerability
- Unvalidated Redirects and Forwards
- Sensitive Data Exposure
- Application Access Control Issues
- Android permission vulnerabilities
- A remote code execution vulnerability in the Android media.
- A remote code execution vulnerability in libxml2
- Android application binary protection
- Android application reversing
- iOS application reverse engineering
- API vulnerabilities
- Buffer overflow in Thick client
- DLL injection
- Business logic validations for Thick client
- Error handling/ information leakage
- Exfiltration of sensitive data from memory