Re: Pen Testing a C# desktop application with source code

From: Jeffrey Rivero (jeffreyr@fissatohosting.com)
Date: Wed Jul 19 2006 - 21:52:19 EDT


i would start with how the application gets it connection to SQL
how does it handle the chicken and egg problem
what authentication occurs vs what access is given to the default
can you bypass the application and then get the SQL connection to the DB
and the like

3 shool wrote:

> Well Mike, the customer has already done that level of testing. I mean
> running code analysis tools. What I am looking for is a way to
> discover security issues rather than small coding bugs as such.
> Probably if we have some documentation for .Net PT that will be a good
> thing.
>
> On 7/18/06, mikeiscool <michaelslists@gmail.com> wrote:
>
>> On 7/19/06, 3 shool <3shool@gmail.com> wrote:
>> > Hello All,
>> >
>> > I am penetration testing a C# (.Net) desktop application with SQL
>> > server as the backend. The source code of the application is also made
>> > available to me. Here is what I have done till now:
>> >
>> > 1. Scanned using Nessus and found that application doesn't have any
>> > services running. It just uses Internet for some services and central
>> > database for storage.
>> >
>> > 2. I used Application Proxy to intercept communications to see if
>> > anything was suspicious but couldn't find anytrhing.
>> >
>> > 3. I didn't try Buffer Overflow attacks as it is secured by .Net
>> itself.
>> >
>> > 4. I know the backend API's but what can be done with those?
>> >
>> > 5. I tried SQL injection but it seems to be protected even for blind
>> > sql injection.
>> >
>> > Till now I haven't found any vulnerability. Any idea what more can I
>> > do? Any other techniques? Any docs?
>> >
>> > Looking for some help from you guys.
>>
>> ...
>>
>> well you have the source.
>>
>> so, you know, look for bugs. or are you saying you don't know what
>> sort of bugs to look for? then why are you a pen tester to begin with?
>>
>> ?
>>
>> -- mic
>>
>
> ------------------------------------------------------------------------------
>
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security? Why not go with the #1
> solution - Cenzic, the only one to win the Analyst's Choice Award from
> eWeek. As attacks through web applications continue to rise, you need
> to proactively protect your applications from hackers. Cenzic has the
> most comprehensive solutions to meet your application security
> penetration testing and vulnerability management needs. You have an
> option to go with a managed service (Cenzic ClickToSecure) or an
> enterprise software (Cenzic Hailstorm). Download FREE whitepaper on
> how a managed service can help you:
> http://www.cenzic.com/news_events/wpappsec.php And, now for a limited
> time we can do a FREE audit for you to confirm your results from other
> product. Contact us at request@cenzic.com for details.
> ------------------------------------------------------------------------------
>
>
>
>

-- 
Jeffrey Rivero
President, Chief Executive Officer
Fissato Hosting Inc.
Phone: (877) 347-7286 x 801
Fax:   (954) 726-5786
E-Mail: jeffreyr@fissatohsoting.com
Web Site: www.fissatohosting.com
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:21 EDT