This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Java applet code review"
From OWASP
Line 19: | Line 19: | ||
#[[All typical server application issues are possible]] | #[[All typical server application issues are possible]] | ||
+ | |||
+ | [http://www.owasp.org/index.php?title=Java_server_%28J2EE%29_code_review&action] | ||
'''Client Security Considerations''' | '''Client Security Considerations''' |
Revision as of 21:19, 21 January 2007
Attackers Reverse Engineer Client
- All clients can be reverse engineered, monitored, and modified
- All encryption keys and mechanisms are not secrets
- All intellectual property (algorithms, data) is disclosed
Attackers Create Malicious Client, Server, or Proxy
Attackers Target Rich Client Application Itself
- Clients can be abused - especially if they are "listening"
- All forms of input corruption (injection, overflow, etc.) can be used
- Spoofed server can be set up
Attackers Target Server Application Vulnerabilities
Client Security Considerations