Difference between revisions of "OWASP Windows Binary Executable Files Security Checks Project"

From OWASP
Jump to: navigation, search
(8 intermediate revisions by one user not shown)
Line 1: Line 1:
= Project About =
 
{{:Projects/OWASP_Windows_Binary_Executable_Files_Security_Checks_Project}}
 
 
= OWASP Windows Binary Executable Files Security Checks =
 
 
This checklist represent a series of tests and the associated tools to perform the tasks related to thick client testing.
 
This checklist represent a series of tests and the associated tools to perform the tasks related to thick client testing.
  
 
We define the thick client as a computer (client) in client–server architecture or networks that typically provides rich functionality independent of the central server. The focus of this checklist will be around PC/Windows architecture, although general concepts apply to all thick clients.
 
We define the thick client as a computer (client) in client–server architecture or networks that typically provides rich functionality independent of the central server. The focus of this checklist will be around PC/Windows architecture, although general concepts apply to all thick clients.
  
=The Map=
+
==The Map==
  
 
[[File:Thick client testing.jpg]]
 
[[File:Thick client testing.jpg]]
 +
 +
==Thick Client Security Testing==
 +
 +
===Information Gathering===
 +
 +
====Application Architecture====
 +
 +
====Platform Mapping====
 +
 +
====Languages and Frameworks====
 +
 +
===Client Side attacks===
 +
 +
====Files Analysis====
 +
 +
====Binary Analysis====
 +
 +
====Memory Analysis====
 +
 +
===Network Side Attacks===
 +
 +
====Installation Traffic====
 +
 +
====Run Time Traffic====
 +
 +
===Server Side Attacks===
 +
 +
====Network Layer Attacks====
 +
 +
====Layer 7 Attacks====
 +
 +
= Project About =
 +
{{:Projects/OWASP_Windows_Binary_Executable_Files_Security_Checks_Project}}
  
 
[[Category:OWASP Project]]
 
[[Category:OWASP Project]]

Revision as of 10:24, 23 August 2013

This checklist represent a series of tests and the associated tools to perform the tasks related to thick client testing.

We define the thick client as a computer (client) in client–server architecture or networks that typically provides rich functionality independent of the central server. The focus of this checklist will be around PC/Windows architecture, although general concepts apply to all thick clients.

Contents

The Map

Thick client testing.jpg

Thick Client Security Testing

Information Gathering

Application Architecture

Platform Mapping

Languages and Frameworks

Client Side attacks

Files Analysis

Binary Analysis

Memory Analysis

Network Side Attacks

Installation Traffic

Run Time Traffic

Server Side Attacks

Network Layer Attacks

Layer 7 Attacks

Project About

PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP Windows Binary Executable Files Security Checks Project (home page)
Purpose: The "Windows Binary Executable Files Security Checks" documentation project aims to provide a security check-list and tools necessary to assess the security of Windows executable files.
License: Creative Commons Attribution ShareAlike 3.0 License (best for documentation projects)
who is working on this project?
Project Leader(s):
  • Dan Vasile @
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Key Contacts
  • Contact Dan Vasile @ to contribute to this project
  • Contact Dan Vasile @ to review or sponsor this project
  • Contact the GPC to report a problem or concern about this project or to update information.
current release
Not Yet Published
last reviewed release
Not Yet Reviewed


other releases