3/8/2023 0 Comments Hack java game![]() ![]() Approach 2: Altering the client and hacking If all the above possibilities are met, we might be able to capture and hack the traffic from a proxy tool like BURP. It does not use encryption, custom protocols or serialized objects.If the Java based application uses the following, then we have a chance of intercepting the traffic for testing: Let us see the various approaches currently available for testing of Java based thick client applications and their respective drawbacks.Īpproach 1: Intercepting and hacking the traffic We are all aware of how difficult it is to intercept thick client applications due to the complexity and nature of these applications. In this article, we will discuss a tool that can be used to assess the security of JAVA based applications. We had discussed a tool called Echo Mirage that can be used to intercept and edit the traffic for. In my previous article on “ Application Security Testing of Thick Client Applications“, I mentioned a few tools that can be used for penetration testing of a thick client application. We do not have automated tools available for automating the security testing of thick client applications. However, the same is not true for thick client applications. We are all aware of tools like Burp, Paros, WebInspect, etc… for intercepting web-based traffic and also for automating the security testing process. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |