Securing Business Apps
Rise of the White Collar Crackers

Author: David Zimmer

  1. Introduction
  2. Bypassing the login
  3. Hacking the User Interface - Privilege Escalation
  4. Conclusion
  5. About the Author

  • Example Binaries and Source - Visual Basic 6 sample business app used for demonstration in paper. Also includes a Patch Manager program so that you can see the effects of the various hacks as the paper progresses.

  • Securing_business_apps.chm - Compiled HTML help archive containing of all of the files used in this paper as a single download.