3 Replies Latest reply on Jul 6, 2013 5:32 PM by jschellSomeoneStoleMyAlias



      Ok I'm trying to wrap my head around every way someone could breach my program.


      Say the program is a classic stand alone three tier but I'm focused mainly on the authentication and connection between the client and server applications not the database.


      Hopefully I've thought of them all but so far I've come up with the following.



      Learning the server end by reading the client side application signatures.

      Intercepting raw network packets. (including all the ways related)

      Breaching the client or server machines via network.

      Stealing a client's login information.


      It seems simple so I ask should I be concerned with any other methods?




      Ryan Bowman