Size: 1.10 GB


This course introduces students to the penetration testing concepts associated with Thick Client Applications. This is an entry level to intermediate level course and we encourage you to take this course if you are interested to learn Thick Client Application Security. This course uses a modified version of vulnerable Thick Client Application called DVTA to demonstrate how thick client application vulnerabilities can be identified and exploited. This course teaches you a variety of Thick Client Application security concepts such as Information Gathering, Traffic Analysis, Reversing &  Patching .NET binaries, Insecure Data Storage, Decrypting encrypted secrets, Privilege Escalation etc. This course acts as a great introduction to spotting and exploiting vulnerabilities in windows executables. Though the course focuses on windows executable files specifically C# .NET binaries, the concepts remain the same for executables of any platform.

Who this course is for:

  • Bug bounty hunters
  • Penetration testers
  • Security Auditors
  • Red Team Operators
  • .NET developers
  • anyone interested in application security.


  • A computer with administrative access, if you want to follow the hands-on exercises.
  • It is good to have some security background, but not mandatory.

What you’ll learn

  • Students will learn practical thick client application penetration testing techniques
  • Students will learn how to reverse engineer .NET binaries
  • Students will learn how to patch .NET binaries
  • Students will learn how to identify and exploit common security issues in 2-tier applications
  • Students will learn multiple ways to intercept TCP traffic coming from thick client apps
  • Students will get real world thick client application penetration testing experience
  • Students will learn how to use several thick client application penetration testing tools


Download Links-

Note: Comment below if you find any link dead or getting problem in downloading files.

You May Also Like

Write an Android Trojan from scratch
Penetration Testing: Advanced Kali Linux
Hacking and Securing Docker Containers


Leave a Reply

Your email address will not be published. Required fields are marked *