Tag: ThickClient
-

Thick Client Pentesting – Part 2: Absolute Traffic Interception
we built our foundation and assembled our arsenal. Now, the theory ends. It’s time to declare war on that .exe file. Most beginner guides give you five complicated ways to proxy traffic. They leave you confused and frustrated when nothing works. Forget that.
-

Thick Client Pentesting – Part : 1 The Foundation & Your Arsenal
Welcome, future hackers. You can fuzz endpoints, find SQLi in your sleep, and bypass authentication on web apps blindfolded. But now you’ve been handed a .exe file. You point Burp at it. Nothing happens. It’s a black box. It’s intimidating.