Enroll in expert-led training with hands-on labs and an Exam Pass Guarantee.
Build your skills with 1,900+ courses and hands-on labs mapped to the roles organizations need most.
CompTIA
ISC2
EC-Council
CMMC
Develop mission-ready teams with approved certifications and hands-on skills training — and keep knowledge in-house with our Knowledge Transfer Guarantee.
Verify real-world cyber capabilities at the micro-skill level so your organization can close gaps, manage risk and prove workforce readiness.
Certify your team and verify their capabilities through accelerated, expert-led training, hands-on labs and guaranteed pass rates that prove ROI.
Develop role-specific capabilities across your workforce with on-demand courses and hands-on labs.
Transform your workforce into your strongest defense with engaging training that drives lasting behavior change.
Reduce security incidents by connecting training to real employee behaviors and measuring impact on organizational risk.
Entry-level to advanced IT security certifications recognized across industries.
Governance, risk and audit certifications for security leadership roles.
Industry-recognized security certifications proving technical expertise and specialized knowledge.
Explore 60+ certification training programs across security, cloud and IT — all backed by our 93% pass rate and expert instruction.
A discussion forum for IT and security professionals to gain certification tips, networking opportunities and peer support.
Build capable security teams with proven frameworks for hiring, training and retaining cybersecurity talent.
For 22+ years, we've helped organizations develop cybersecurity teams with verified capabilities they can trust to defend against evolving threats.
SecVulture is an Information Security professional with experience in Web, Thick client and Mobile Application Security, currently working with Infosec Institute as a researcher.
Email: secvulture@gmail.com
October 31, 2016
In the previous article, we have discussed source code review of .NET applications. Readers are introduced to a tool called Visual Code Grepper, which can he
September 28, 2016
Practical Thick Client Application Penetration Testing using Damn Vulnerable Thick Client App: Automated Source code review Background: In the previous arti
September 26, 2016
Background: In the previous article, we have discussed the basics of DLL Hijacking vulnerabilities and how one can find and exploit DLL Hijacking vulnerabi
September 23, 2016
Background: Welcome to the part 7 of Practical Thick Client Application Penetration Testing using Damn Vulnerable Thick Client App (DVTA). In the prev
September 21, 2016
Background: [pkadzone zone="main_top"] In the previous article, we have discussed how .NET applications can be Reverse Engineered using dotPeek to vie
September 19, 2016
Background In the previous article, we have discussed injection attacks in Thick Client Applications specifically in DVTA. In this article, we will di
September 8, 2016
Background: In the previous article, we have seen some of the common data storage issues in Thick Client Applications specifically in DVTA. In this article,
September 6, 2016
Practical Thick Client Application Penetration Testing using Damn Vulnerable Thick Client App: Insecure Data Storage Background: Welcome to part-3 of thick
August 30, 2016
Background: In the first part of this series, we have seen an introduction to Thick Client Applications, set up Damn Vulnerable Thick Client Application and
August 25, 2016
Though, thick client applications are not new, penetration testing process for thick clients is not as straight as Web Application Penetration testing. It is