In the previous article, we have discussed the reverse engineering of original DVTA application in the Lab setup of Thick Client: DVTA part 2 In this part, we are going to systematically pentesting the DVTA application for various issues. Table of Content Prerequisites Information Gathering by using CFF Explorer Information
The post Thick Client Penetration Testing: Information Gathering appeared first on Hacking Articles.