Thick Client Vulnerabilities

  1. Hardcoded Secrets - Binaries, Registries, Files

  2. Sensitive Information in Logs

  3. Weak File/Folder/Registry Permission - icacls FILEPATH

  4. Weak Service Permissions - accesschk.exe /accepteula -uwcqv "Authenticated Users" * [Check for SERVICE_ALL_ACCESS or SERVICE_CHANGE_CONFIG services]

  5. Sensitive Information in Memory

  6. Unquoted Service Paths - cmd /c wmic service get name,displayname,pathname,startmode|findstr /i /v """

  7. Misconfigured/Weak Permission for Named-Pipesarrow-up-right - accesschk.exe /accepteula "PIPE_LOCATION"

  8. Insecure Communication Protocols (EchoMirage, WireShark, Burp Suite)

  9. Buffer Overflow, Integer Overflow, Heap Overflow

  10. Double Free

  11. Use After Free, Null Pointer Reference

  12. Format String Vulnerability

  13. ASLR, DEP, SafeSEH & CFG not enabled (PESecurityarrow-up-right)

  14. Path traversal, Arbitrary File Read, Arbitrary File Write, Zip Slip

  15. Lack Of Obfuscation

  16. SQL Injection, Command Injection

  17. Usage Of Vulnerable & Outdated Components

  18. Improper Hostname/SSL Validations

Reverse Engineering Tools -

  1. JD-GUI - Java

  2. JADX - Android

  3. dnSpy - .NET decompiler & debugger

  4. dotPeek - .NET Decompiler

  5. Ghidra

  6. Immunity Debugger & mona

  7. IDA

Last updated