Learning Resources #
Contents #
- Sample vulnerable thick client applications
- Vulnerability ranking
- Common Vulnerabilities
- Video Reference
Sample vulnerable Thick Client application #
DVTA - Damn Vulnerable Thick Client Application #
https://github.com/srini0x00/dvta
- https://www.hackingarticles.in/thick-client-pentest-lab-setup-dvta-2/
- https://www.hackingarticles.in/thick-client-pentest-lab-setup-dvta-part-2/
- https://parsiya.net/blog/2018-07-15-dvta-part-1-setup/
BetaBank #
https://github.com/NetSPI/BetaFast/tree/master/BetaBank
BetaFast #
https://github.com/NetSPI/BetaFast/tree/master/BetaFast
OWASP Desktop App Security Top 10 #
https://owasp.org/www-project-desktop-app-security-top-10/
Some Common Vulnerabilities #
DLL Hijacking
- https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/dll-hijacking
- https://hackerone.com/reports/1636566
- https://securitycafe.ro/2023/06/19/dll-hijacking-finding-vulnerabilities-in-pestudio-9-52/
- https://www.cyberark.com/resources/threat-research-blog/dllspy-tighten-your-defense-by-discovering-dll-hijacking-easily
- https://www.exploit-db.com/exploits/51678
DLL Side-loading
Sensitive credentials leaked in source code on Github
Application data being stored in System Registry
Unsigned .exe or .dll files
Unencrypted application data in network during transmission
- Use of Wireshark to analyze traffic
- https://www.netspi.com/blog/technical/thick-application-penetration-testing/introduction-to-hacking-thick-clients-part-2-the-network/
Unecrypted application data stored in the computer
Memory protection checks
- https://blog.securelayer7.net/static-analysismemory-forensics-reverse-engineering-thick-client-penetration-testing-part-4/
- https://msrc.microsoft.com/blog/2010/12/on-the-effectiveness-of-dep-and-aslr/
- https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/windows-10-memory-protection-features/ba-p/259046
- https://www.exploit-db.com/exploits/49959 (Buffer Overflow SEH + DEP Bypass using JOP)
Symlink attack
- https://www.exploit-db.com/papers/13199 (Crafting Symlinks for Fun and Profit)
- https://www.darkrelay.com/post/thick-client-penetration-testing
- https://nixhacker.com/understanding-and-exploiting-symbolic-link-in-windows/
- https://www.exploit-db.com/exploits/51151 (Local Privilege Escalation)
- https://www.exploit-db.com/exploits/48079 (Windows 10 Privilege Escalation)
Insecure File/Folder Permissions
- https://www.exploit-db.com/exploits/51682 (Insecure Folders Permissions)
- https://ss64.com/nt/icacls.html (icacls)
- https://www.exploit-db.com/exploits/51680 (Remote Work Insecure Files and Folders)
- https://www.exploit-db.com/exploits/51453 (ACL Service LPE)
- https://www.exploit-db.com/exploits/51479 (Weak Service Privilege Escalation)
- https://www.exploit-db.com/exploits/51410 (Local Privilege Escalation / Incorrect Access Control)
Unquoted service path
Buffer Overflow
- https://www.exploit-db.com/exploits/50510 (Denial of Service (PoC))
- https://www.exploit-db.com/exploits/50999 (Remote Stack Buffer Overflow (SEH))
- https://www.exploit-db.com/exploits/50470 (Buffer Overflow (SEH) - Bind Shell)
- https://www.exploit-db.com/exploits/51223 (Buffer Overflow - Opens Calculator)
- https://www.exploit-db.com/exploits/51196 (Buffer Overflow (DoS))
- https://www.exploit-db.com/exploits/51102 (Buffer overflow DoS)
Denial of Service
- https://www.exploit-db.com/exploits/50266 (‘Multiple’ Denial of Service (PoC))
- https://security.stackexchange.com/questions/33604/why-is-application-crash-considered-insecure#:~:text=An%20attacker%20may%20try%20to,system%20and%20its%20internal%20details.
- https://learn.microsoft.com/en-us/archive/msdn-magazine/2007/november/analyze-crashes-to-find-security-vulnerabilities-in-your-apps
Remote code execution