Web application security - the fast guide Chapter 5: Attack Execution - the client | Page 9

Decompile Flash, Java applet and Silverlight Attack requirement: Store data are not encrypted Attacker has access to client machine. Attack process Direct access to SQLlight data file using SQLlight DB browser Exploit the discovered data or use as base to initiate another attack. 2017-05-10 Web Application Security Fast Guide (book slides) By Dr.Sami Khiami Slide 9