# Introduction Articles

{% embed url="<https://www.cyberark.com/resources/threat-research-blog/thick-client-penetration-testing-methodology>" %}

{% embed url="<https://qualysec.com/thick-client-pen-testing-a-comprehensive-guide/>" %}

{% embed url="<https://payatu.com/blog/intercept-thick-client-tcp-traffic/>" %}

{% embed url="<https://payatu.com/blog/thick-client-penetration-testing/>" %}

{% embed url="<https://payatu.com/blog/pentesting-linux-thick-client-applications/>" %}

{% embed url="<https://www.cobalt.io/blog/cobalt-core-academy-thick-client-pentesting>" %}

{% embed url="<https://www.cobalt.io/blog/attacking-windows-applications-pt.-2>" %}

{% embed url="<https://www.cobalt.io/blog/attacking-windows-applications-part-1>" %}

{% embed url="<https://csbygb.gitbook.io/pentips/thick-client-pentest/thick-client>" %}

{% embed url="<https://medium.com/@urshilaravindran/thick-client-pentesting-reconnaissance-exploitation-security-measures-88cc3ee76353>" %}

{% embed url="<https://medium.com/@tushar_rs_/thick-client-penetration-testing-4ce49d0bb39c>" %}

{% embed url="<https://infosecwriteups.com/thick-client-pentest-modern-approaches-and-techniques-part-1-7bb0f5f28e8e>" %}
