At a Glance
- Engagement type: Manual + automated thick client (desktop) application penetration testing
- Coverage: Binary analysis, runtime instrumentation, network protocol, local file system, registry, IPC
- Typical duration: 1-2 weeks total, based on application complexity and feature count
- Starts from INR 25,000: fixed price scoped after a free 30-minute call
- Response time: instant, no delay. We start same day or next business day after scoping
What is It?
A thick client security audit is a comprehensive penetration test of your desktop or rich client application covering binary, runtime, network and local layers. We test for DLL hijacking, memory tampering, insecure inter-process communication, privilege escalation paths and protocol-level issues with backend services.
Codesecure's thick client VAPT is delivered by OSCP and OSEP-certified consultants under signed NDA. Every engagement combines reverse engineering, runtime analysis (Frida, Process Monitor), traffic interception and manual exploitation. Output mapped to OWASP and your compliance frameworks.
Why It Matters
Thick client applications often run in trusted environments with elevated privileges, handle sensitive data locally and communicate with backend services using proprietary protocols. Compromise frequently yields domain admin, sensitive data exposure or full backend service abuse.
For Indian enterprises using thick clients in banking (trading desks, treasury apps), healthcare (LIS, HIS workstations), manufacturing (MES, SCADA HMI) and government (citizen services), thick client VAPT is increasingly demanded by procurement and required for security certifications.
What We Test
Comprehensive coverage of the most exploitable risk categories for this service:
DLL Hijacking & InjectionSearch order hijacking, side-by-side loading, AppInit DLL abuse
Memory TamperingIn-memory string manipulation, debugger detection bypass, anti-tampering bypass
Insecure Local StoragePlaintext config files, weak crypto, exposed databases, registry credentials
Privilege EscalationService permissions, file permissions, scheduled tasks, weak ACLs
Protocol & NetworkCustom protocol fuzzing, MITM, replay, traffic encryption review
Inter-Process CommunicationNamed pipes, COM/DCOM, RPC, shared memory abuse
Authentication & SessionToken handling, session fixation, credential storage, SSO integration
Authorization BypassClient-side trust violations, server-side authorization gaps
Update MechanismInsecure update channels, signature verification, downgrade attacks
Anti-Reverse EngineeringCode obfuscation review, anti-debug bypass, packer effectiveness
Get a Free 30-Minute Scoping Call
Tell us about your environment and we'll send a fixed-price proposal within 48 hours under a signed NDA. No obligation. Instant response, no delay.
Book Free Scoping Call
Our Methodology
Every engagement follows a 5-phase methodology aligned with PTES, NIST SP 800-115 and OWASP testing guides:
1
Scoping & Reconnaissance
Free scoping call, signed NDA, fixed-price proposal in 24-48 hours. Asset discovery, OSINT, attack surface mapping.
2
Threat Modeling
Targeted threat models against OWASP, MITRE ATT&CK, your specific business logic and applicable compliance frameworks.
3
Automated & Manual Testing
Reverse engineering (IDA Pro, Ghidra, dnSpy), runtime analysis (Frida, Process Monitor, API Monitor), traffic interception (Wireshark, Echo Mirage), and deep manual exploitation by OSCP/OSEP-certified consultants.
4
Reporting & Walkthrough
Executive summary plus technical report mapped to OWASP, CVSS v3.1 and your compliance frameworks. Live walkthrough with your engineering team.
5
Retest & Sign-Off
Free retest of all critical and high findings within 30 days. Formal sign-off letter and certificate. Customer data deleted 90 days after sign-off.
What You Get
Every engagement ships with the same audit-ready evidence pack:
Executive SummaryBoard-ready PDF with business impact, risk posture and prioritised actions
Technical ReportDeveloper-actionable findings with PoC evidence, CVSS scores and code-level fixes
Engagement CertificateSigned certificate suitable for customer and regulator evidence
Free RetestValidation of all critical/high fixes within 30 days at no additional cost
Compliance MappingFindings mapped to ISO 27001, SOC 2, PCI DSS, HIPAA, DPDP Act controls
Engineering WalkthroughLive session with your team to clarify findings and fix approach
Engagement Timeline
Most engagements complete in 1-2 weeks based on environment size. Instant response, no delay, we start the same day or next business day after scoping.
Day 1-2
Scoping & Kickoff
Free 30-minute call, NDA, fixed-price proposal, environment access and threat modeling. We start immediately after sign-off.
Day 3-10
Active Testing
Automated scanning plus deep manual testing by certified consultants. Daily status updates. Critical findings flagged immediately.
Day 10-14
Reporting & Walkthrough
Executive and technical reports delivered. Live walkthrough with engineering. Free retest scheduled within 30 days.
Transparent Pricing
Fixed-price engagements based on environment size and complexity. No hidden costs, no per-finding surprises.
Starts from INR 25K
Final price scoped to your environment
Varies by size, complexity and scope. Fixed price confirmed after a free 30-minute scoping call. Instant response, no delay.
Get Exact Quote →
Talk to a Certified Consultant
30-minute call with our service lead. Get a sense of fit, scoping and timeline, no sales pressure.
Schedule Free Call
Frequently Asked Questions
What languages and frameworks do you test?
C/C++, .NET (C#, VB.NET), Java (Swing, JavaFX), Electron, Python, Delphi. Both native and managed code, both legacy and modern frameworks.
Do you need source code for thick client testing?
Not required, but helpful. Reverse engineering with tools like IDA Pro, Ghidra and dnSpy reveals structural information from binaries. With source code (gray-box), we find business logic issues faster in the same engagement.
How long does a thick client engagement take?
Most thick clients complete in 1-2 weeks based on feature complexity. Simple single-purpose apps: 5-7 days; complex multi-module enterprise apps: 10-14 days. We respond instantly, starting same/next business day after scoping.
What does it cost in INR?
Pricing starts from INR 25,000 and varies by binary size, feature complexity, protocol count and platform (Windows, macOS, Linux). Fixed price after free 30-minute scoping call.
How quickly can you start?
Instant response, no delay. Response within an hour during business hours, proposal within 24-48 hours under signed NDA, active testing starts same/next business day after sign-off.
Do you test against production data or sample data?
We use sample data or anonymized test data. Production data testing is supported under specific NDA terms but rarely needed for thick client VAPT, where structural issues are what we focus on.
Will testing affect our production users?
No. Thick client testing happens against a copy of the installer in a lab environment, isolated from production users. Network traffic interception uses a controlled environment.
Ready to Get Started?
Codesecure is ISO/IEC 27001:2022 certified. Our certified team delivers fixed-price engagements with executive-ready outcomes. Free 30-minute scoping call, instant response, no obligation.
Get a Free Scoping Call
See All Services