Desktop apps are a forgotten attack surface. Most organisations test their web apps and ignore the software running on every workstation.
Talk to an ExpertERP systems, trading platforms, custom enterprise tools, and proprietary client software — thick clients often have privileged access to sensitive data and backend systems, with weaker security controls than their web counterparts. HackLabs' consultants have deep experience reverse-engineering and attacking desktop applications across Windows, macOS, and Linux, finding vulnerabilities that automated tools simply can't reach.
HackLabs holds CREST accreditation across all testing disciplines. Every engagement is conducted to CREST standards by certified consultants.
Every engagement is led by an experienced senior consultant. You get depth of analysis and findings that actually matter to your security posture.
Findings are prioritised by real-world risk. You receive an executive summary, technical findings, and a remediation roadmap your team can act on immediately.
Static and dynamic analysis of compiled binaries — decompilation, code review, and reverse engineering to identify security flaws invisible in source code reviews.
Testing for DLL search order hijacking, phantom DLL loading, and injection opportunities that could allow privilege escalation or code execution.
Analysis of how the application stores credentials, API keys, and sensitive data locally — in registry, files, databases, and memory.
Runtime memory inspection to identify sensitive data (credentials, keys, PII) held unencrypted in process memory or accessible via scraping attacks.
Testing for SSL pinning bypass and proxy resistance — ensuring the application can't be trivially intercepted to expose backend API calls.
Once we understand the application's API surface, we test the backend services for the same vulnerabilities as a dedicated API pentest.
We define the engagement boundaries, objectives, and rules of engagement. Clear scope means focused testing and accurate results.
Senior consultants conduct both automated and manual testing, replicating real-world attack techniques against your environment.
Detailed technical findings with risk ratings, proof-of-concept evidence, and clear remediation guidance for both technical and executive audiences.
We stay engaged beyond the report. Our team answers remediation questions and offers a complimentary re-test on critical findings.
CREST-certified testers across all disciplines. Independently audited methodology you can trust.
Extensive track record across enterprise, government, and critical infrastructure sectors.
Founded by Chris Gatford — over two decades of offensive security experience at your service.
No graduates on client engagements. Every test is run by experienced, certified professionals.
Test the web application counterpart of your thick client for authentication, injection, and access control flaws.
Dedicated testing for the REST, GraphQL, or SOAP APIs powering your desktop application.
Test the network environment where your thick clients operate and the servers they connect to.
Talk to a HackLabs specialist about scoping a thick client assessment for your environment.
Talk to an Expert