![Pentesting Java Thick Clients using Burp and JDSer-DComp](https://twelvesec.com/wp-content/uploads/2017/06/Java-code-pentesting-min.jpg)
![Pentesting Java Thick Clients using Burp and JDSer-DComp](https://twelvesec.com/wp-content/uploads/2017/06/Java-code-pentesting-min.jpg)
LATEST POSTS
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
TAGS
CCPA
security
Penetration Testing
pen-test
community
pentesting
Privacy
mobile
social distancing
teleworking
Application Penetration Test
GDPR
penetration test
pentest
infosec
capture the flag
Information Leakage
IT security
Web Application Penetration Testing
Phising
Reverse Engineering
Burp Extender
Web Security
Cyber Defense tool
partnerships
social responsibility
cybersecurity
Coronavirus
Covid-19
Misconfigurations
TwelveSec
Mobile Security
Corelan
ctf
reversing
vulnerabilities
android
Ransomware attacks
collaborations
GDPR compliance
iot
computer security
cyber security
self-isolation
ICT security
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.