Dashboard Modules Paths Purchase Cubes   jbeck2024

Integrated Terminal

ATTACKING COMMON APPLICATIONS

  1. Page 22
  2. Exploiting Web Vulnerabilities in Thick-Client Applications

Exploiting Web Vulnerabilities in Thick-Client Applications


Thick client applications with a three-tier architecture have a security advantage over those with a two-tier architecture since it prevents the end-user from communicating directly with the database server. However, three-tier applications can be susceptible to web-specific attacks like SQL Injection and Path Traversal.

During penetration testing, it is common for someone to encounter a thick client application that connects to a server to communicate with the database. The following scenario demonstrates a case where the tester has found the following files while enumerating an FTP server that provides anonymous user access.

Reading the content of all the text files reveals that:

Let's run the fatty-client.jar file by double-clicking on it. Once the app is started, we can log in using the credentials qtc / clarabibi.