Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: Pen Testing a C# desktop application with source code
From: Jeffrey Rivero <jeffreyr () fissatohosting com>
Date: Wed, 19 Jul 2006 21:52:19 -0400

i would start with how the application gets it connection to SQL
how does it handle the chicken and egg problem
what authentication occurs vs what access is given to the default
can you bypass the application and then get the SQL connection to the DB
and the like

3 shool wrote:

Well Mike, the customer has already done that level of testing. I mean
running code analysis tools. What I am looking for is a way to
discover security issues rather than small coding bugs as such.
Probably if we have some documentation for .Net PT that will be a good
thing.

On 7/18/06, mikeiscool <michaelslists () gmail com> wrote:

On 7/19/06, 3 shool <3shool () gmail com> wrote:
> Hello All,
>
> I am penetration testing a C# (.Net) desktop application with SQL
> server as the backend. The source code of the application is also made
> available to me. Here is what I have done till now:
>
> 1. Scanned using Nessus and found that application doesn't have any
> services running. It just uses Internet for some services and central
> database for storage.
>
> 2. I used Application Proxy to intercept communications to see if
> anything was suspicious but couldn't find anytrhing.
>
> 3. I didn't try Buffer Overflow attacks as it is secured by .Net itself.
>
> 4. I know the backend API's but what can be done with those?
>
> 5. I tried SQL injection but it seems to be protected even for blind
> sql injection.
>
> Till now I haven't found any vulnerability. Any idea what more can I
> do? Any other techniques? Any docs?
>
> Looking for some help from you guys.

...

well you have the source.

so, you know, look for bugs. or are you saying you don't know what
sort of bugs to look for? then why are you a pen tester to begin with?

?

-- mic


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------





--
Jeffrey Rivero
President, Chief Executive Officer
Fissato Hosting Inc.
Phone: (877) 347-7286 x 801
Fax:   (954) 726-5786
E-Mail: jeffreyr () fissatohsoting com
Web Site: www.fissatohosting.com


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]