Electron-Based App Security Testing Fundamentals Part 3 (1st Section) — Extracting and Analyzing .asar Files – Company Blog

Common Method for Extracting and Analyzing .asar Files.

In the name of Allah, the Most Gracious, the Most Merciful.


This marks the third part of a series of articles exploring the fundamentals of security testing for Electron-based applications.

In this part, we will explore the importance of extracting and analyzing .asar files to gather useful information. As a note, we split this part into two sections to emphasize the information in each article. In the second section later, we will discuss a unique case study we have encountered.

If you are just beginning to read this article, in the previous part, we explained the essential processes of installing and detecting Electron-based applications, including how to detect their presence on various operating systems — both manually and automatically.

Note: This article has been published on the company blog where I am employed. Please visit the post for more details:

https://medium.com/haktrak-cybersecurity-squad/electron-based-app-security-testing-fundamentals-part-3-1st-section-extract-analyze-asar-3a769be12fc4

Sample of Search Result with grep
Share

You may also like...