Tagged: Application Testing
September 25, 2018 at 2:38 pm #169326Michael J. ConwayParticipant
This goes with what I want to do with my home pentest lab that I am working on. I am an avid gamer and enjoy, not just the game, but the community that makes the game what it is. In this case, one of the games I actively play, Thin Infinite Black (TIB) by Spellbook Studios, is actively developing a follow up to that game and will be opening it to the community that backed its’ Kickstarter to do beta testing. So my current plan is to be brutal to the client application. The client application is cross-platform and can be found for Android, iOS, Mac, and Linux.
The current application makes me wonder what I will find with the new version. Since there is a EULA in place, I have not really poked around the current version as I don’t feel like getting banned. However, my plan is slightly different for the beta.
1. Get permission form developer
2. Install in a VM
3. Attach to debugger (x64debug)
4. Setup network sniffer (Wireshark)
5. Hunt down any xml files
6. Use a proxy (Burp Suite or similar)
After all that is set up, my plan is to fuzz whatever I can fuzz as well as look at the traffic it generates to see what I can find there. As of right now I am not planning anything against the server nor modifying the client.
What do you all think?
September 25, 2018 at 8:26 pm #169327MTGreenParticipant
I think that sounds like a plan.
It is great to have an objective for your home lab, and with permission from the developer you will have room to move. I would like to learn about the permission and how it is expressed. I would also be glad to learn of interesting developments along the way (hopefully not getting banned).
You must be logged in to reply to this topic.