This discussion is archived
3 Replies Latest reply: Jul 6, 2013 10:32 AM by jschellSomeoneStoleMyAlias RSS


2a614dc0-adcc-402b-b338-8adfe88b1e6e Newbie
Currently Being Moderated

Ok I'm trying to wrap my head around every way someone could breach my program.


Say the program is a classic stand alone three tier but I'm focused mainly on the authentication and connection between the client and server applications not the database.


Hopefully I've thought of them all but so far I've come up with the following.



Learning the server end by reading the client side application signatures.

Intercepting raw network packets. (including all the ways related)

Breaching the client or server machines via network.

Stealing a client's login information.


It seems simple so I ask should I be concerned with any other methods?




Ryan Bowman


  • Correct Answers - 10 points
  • Helpful Answers - 5 points