Web application security - the fast guide Chapter 5: Attack Execution - the client | Page 9
Decompile Flash, Java applet and Silverlight
Attack requirement:
Store data are not encrypted
Attacker has access to client machine.
Attack process
Direct access to SQLlight data file using SQLlight DB browser
Exploit the discovered data or use as base to initiate another attack.
2017-05-10
Web Application Security Fast Guide (book slides)
By Dr.Sami Khiami
Slide 9