SlideShare a Scribd company logo
Steven C. Markey,MSIS,PMP,CISSP,CIPP/US,CISM,CISA,STS-EV,CCSK
Principal,nControl,LLC
AdjunctProfessor
Reverse Engineering Thick-clients
• Agenda
– Thick-client Overview
– Attack Surface
– Reverse Engineering Thick-clients
Reverse Engineering Thick-clients
Reverse Engineering Thick-clients
• Thick-client Overview
– “Old School”
• Local Software & Occasional Local Storage
– Local Software Connecting to Server Software
• Traditionally Installed Local Software via TCP/IP Sockets
• Web Delivered Local Software via TCP/IP Sockets
• Web Delivered Local Software via HTTP/S
– Alternative to Web/Thin Clients
• Occasionally More Efficient
• Allows for Interaction with Local Office Automation Software
• Allows for Syncing/Batch Uploads for Offline Use
Reverse Engineering Thick-clients
• Thick-client Attack Surface
– Local Software & Local Storage = Local Exposures
• Rootkits
• Cache & Registry Corruption
• Information Disclosure
– One-off Exposures
• Access to Office Automation Software Exposures
– Ignorance is Bliss
• Assumed Lack of Attack Surface
– Can Still Proxy Requests
– Sniffers Can Be Goldmines
• Overreliance on Data in Transit Crypto Protections
• Overreliance on Segregation of Duties & Access Controls
Reverse Engineering Thick-clients
• Reverse Engineering Thick-clients
– Tools
• Decompilers: Dotpeek, Reflector, JustDecompile, ILSpy, DILE,
PEBrowse, Java Decompile, Mocha & DJ Java Compiler
• Profilers: Eclipse – Test & Performance Tools Platform (TPTP),
MSVS – MSIL Disassembler (lldasm), YourKit & DTrace
• Proxies: Burp – Wsdler.jar, BurpJDSer.jar, ZAP & Paros
• Sniffers: Wireshark
– Access
• Binaries
• Local Files, Storage & Office Automation Plugins
Reverse Engineering Thick-clients
• Example
– App
• Java Swing TCP-based Thick-client  AWS EC2 Java 7
– AWS AMI Linux Distro, Executable JAR on Server & Local MySQL
– Windows 8.1, Java 7
– Tools
• Decompilers: DJ Java Decompiler & Mocha
• Profilers: YourKit
• Proxies: Burp – Wsdler.jar, BurpJDSer.jar
• Sniffers: Wireshark
– Access
• Binaries, Local Files, Storage & Office Automation Plugins
• Questions?
• Contact
– Email: steve@ncontrol-llc.com
– LinkedIn: http://www.linkedin.com/in/smarkey
– Twitter: markes1

More Related Content

PDF
Thick Application Penetration Testing - A Crash Course
PPT
Thick client application security assessment
PDF
Fuzzing and You: Automating Whitebox Testing
PDF
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
PPTX
Thick client pentesting_the-hackers_meetup_version1.0pptx
PDF
Thick Application Penetration Testing: Crash Course
PDF
WTF is Penetration Testing
PPTX
Extracting Credentials From Windows
Thick Application Penetration Testing - A Crash Course
Thick client application security assessment
Fuzzing and You: Automating Whitebox Testing
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
Thick client pentesting_the-hackers_meetup_version1.0pptx
Thick Application Penetration Testing: Crash Course
WTF is Penetration Testing
Extracting Credentials From Windows

What's hot (20)

PDF
All You Need is One - A ClickOnce Love Story - Secure360 2015
PDF
Attack All the Layers - What's Working in Penetration Testing
PDF
Attack All the Layers: What's Working during Pentests (OWASP NYC)
PDF
Integrating Black Duck into Your Environment with Hub APIs
PDF
How we breach small and medium enterprises (SMEs)
PDF
Ch 6: Attacking Authentication
PPTX
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
PDF
PDF
Is Your Mobile App Secure?
PDF
CNIT 126: Ch 2 & 3
PDF
Ch 10: Attacking Back-End Components
PDF
Attack all the layers secure 360
PPTX
Exploiting appliances presentation v1.1-vids-removed
PDF
CNIT 129S Ch 4: Mapping the Application
PDF
Don't Let Open Source be the Deal Breaker In Your M&A
PDF
Secure Application Development in the Age of Continuous Delivery
PDF
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
PDF
CISSP Prep: Ch 9. Software Development Security
PDF
Ch 7: Attacking Session Management
PDF
CNIT 129S: Ch 12: Attacking Users: Cross-Site Scripting
All You Need is One - A ClickOnce Love Story - Secure360 2015
Attack All the Layers - What's Working in Penetration Testing
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Integrating Black Duck into Your Environment with Hub APIs
How we breach small and medium enterprises (SMEs)
Ch 6: Attacking Authentication
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Is Your Mobile App Secure?
CNIT 126: Ch 2 & 3
Ch 10: Attacking Back-End Components
Attack all the layers secure 360
Exploiting appliances presentation v1.1-vids-removed
CNIT 129S Ch 4: Mapping the Application
Don't Let Open Source be the Deal Breaker In Your M&A
Secure Application Development in the Age of Continuous Delivery
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
CISSP Prep: Ch 9. Software Development Security
Ch 7: Attacking Session Management
CNIT 129S: Ch 12: Attacking Users: Cross-Site Scripting
Ad

Viewers also liked (20)

PPTX
Alpha and Omega: Program Outcomes to the Capstone
PPT
ICS_Cybersecurity_FINAL
PPTX
Maotchitim
PPT
Presentatie hrm inspiratiedag
PPT
Securing_Medical_Devices_v5
PPTX
Secure_Development_ISSA_v4
PDF
MARIA AUXILIADORA
PPTX
Cloud_Computing_IIMC_v1
PPTX
Passion, Persistence, and Patience: The Search for Amelia Earhart
PPTX
Webinar Slides-Three Knows to Great Writing Nov 4 2014
PPT
SSO_Good_Bad_Ugly
PPT
e-Discovery_2_Cloud_v5
PPTX
Going_Mobile_101_IIMC_v5
PPTX
Vendor_Mgmt_101_IIMC_v2
PDF
ERAU Webinar Slides: Global Business Environment--China Trip
PDF
Na it infographic_fnl
PPT
Cryptov2 v1
PDF
FOJ Marketing 2015
PPTX
Safety webinar with mark friend
PPT
Securing_Dbs_in_Cloud_v12
Alpha and Omega: Program Outcomes to the Capstone
ICS_Cybersecurity_FINAL
Maotchitim
Presentatie hrm inspiratiedag
Securing_Medical_Devices_v5
Secure_Development_ISSA_v4
MARIA AUXILIADORA
Cloud_Computing_IIMC_v1
Passion, Persistence, and Patience: The Search for Amelia Earhart
Webinar Slides-Three Knows to Great Writing Nov 4 2014
SSO_Good_Bad_Ugly
e-Discovery_2_Cloud_v5
Going_Mobile_101_IIMC_v5
Vendor_Mgmt_101_IIMC_v2
ERAU Webinar Slides: Global Business Environment--China Trip
Na it infographic_fnl
Cryptov2 v1
FOJ Marketing 2015
Safety webinar with mark friend
Securing_Dbs_in_Cloud_v12
Ad

Similar to Reverse_Engineering_Thick-clients (6)

PDF
Thick Client Testing Basics
PDF
Thick Client Penetration Testing.pdf
PDF
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
DOCX
Thin client
PPTX
GTB DLP Suite Presentation
PDF
Gtb Dlp Suite Presentation
Thick Client Testing Basics
Thick Client Penetration Testing.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thin client
GTB DLP Suite Presentation
Gtb Dlp Suite Presentation

Reverse_Engineering_Thick-clients

  • 2. • Agenda – Thick-client Overview – Attack Surface – Reverse Engineering Thick-clients Reverse Engineering Thick-clients
  • 3. Reverse Engineering Thick-clients • Thick-client Overview – “Old School” • Local Software & Occasional Local Storage – Local Software Connecting to Server Software • Traditionally Installed Local Software via TCP/IP Sockets • Web Delivered Local Software via TCP/IP Sockets • Web Delivered Local Software via HTTP/S – Alternative to Web/Thin Clients • Occasionally More Efficient • Allows for Interaction with Local Office Automation Software • Allows for Syncing/Batch Uploads for Offline Use
  • 4. Reverse Engineering Thick-clients • Thick-client Attack Surface – Local Software & Local Storage = Local Exposures • Rootkits • Cache & Registry Corruption • Information Disclosure – One-off Exposures • Access to Office Automation Software Exposures – Ignorance is Bliss • Assumed Lack of Attack Surface – Can Still Proxy Requests – Sniffers Can Be Goldmines • Overreliance on Data in Transit Crypto Protections • Overreliance on Segregation of Duties & Access Controls
  • 5. Reverse Engineering Thick-clients • Reverse Engineering Thick-clients – Tools • Decompilers: Dotpeek, Reflector, JustDecompile, ILSpy, DILE, PEBrowse, Java Decompile, Mocha & DJ Java Compiler • Profilers: Eclipse – Test & Performance Tools Platform (TPTP), MSVS – MSIL Disassembler (lldasm), YourKit & DTrace • Proxies: Burp – Wsdler.jar, BurpJDSer.jar, ZAP & Paros • Sniffers: Wireshark – Access • Binaries • Local Files, Storage & Office Automation Plugins
  • 6. Reverse Engineering Thick-clients • Example – App • Java Swing TCP-based Thick-client  AWS EC2 Java 7 – AWS AMI Linux Distro, Executable JAR on Server & Local MySQL – Windows 8.1, Java 7 – Tools • Decompilers: DJ Java Decompiler & Mocha • Profilers: YourKit • Proxies: Burp – Wsdler.jar, BurpJDSer.jar • Sniffers: Wireshark – Access • Binaries, Local Files, Storage & Office Automation Plugins
  • 7. • Questions? • Contact – Email: steve@ncontrol-llc.com – LinkedIn: http://www.linkedin.com/in/smarkey – Twitter: markes1