This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP Windows Binary Executable Files Security Checks Project
From OWASP
Revision as of 15:20, 23 August 2013 by Dan Vasile (talk | contribs)
Project About
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Binary Checklist
This checklist represent a series of tests and the associated tools to perform the tasks related to thick client testing.
We define the thick client as a computer (client) in client–server architecture or networks that typically provides rich functionality independent of the central server. The focus of this checklist will be around PC/Windows architecture, although general concepts apply to all thick clients.
The Map
Thick Client Security Testing
Information Gathering
Application Architecture
Platform Mapping
Languages and Frameworks
Client Side attacks
Files Analysis
Binary Analysis
Memory Analysis
Network Side Attacks
Installation Traffic
Run Time Traffic
Server Side Attacks
Network Layer Attacks
Layer 7 Attacks