![Pentesting Java Thick Clients using Burp and JDSer-DComp](https://twelvesec.com/wp-content/uploads/2017/06/Java-code-pentesting-min.jpg)
![Pentesting Java Thick Clients using Burp and JDSer-DComp](https://twelvesec.com/wp-content/uploads/2017/06/Java-code-pentesting-min.jpg)
LATEST POSTS
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
TAGS
Mobile Security
IT security
Cyber Defense tool
Coronavirus
security
social distancing
Reverse Engineering
Web Security
cyber security
Web Application Penetration Testing
penetration test
Ransomware attacks
android
ICT security
ctf
teleworking
cybersecurity
computer security
mobile
self-isolation
pen-test
iot
Application Penetration Test
partnerships
Covid-19
Burp Extender
social responsibility
Misconfigurations
vulnerabilities
Phising
infosec
Information Leakage
collaborations
TwelveSec
GDPR compliance
Penetration Testing
reversing
CCPA
capture the flag
Corelan
Privacy
GDPR
pentest
pentesting
community
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.