It is way easier for attackers to reverse engineer desktop applications
than web applications. Assuming proper server configuration, it is next
to impossible for an attacker to get the server side source code or
compressed form (e.g WARs) for a web application and proceed with
disassembly/decompilation/patching. I do not have any experience with
obfuscating or otherwise armoring executables created from scripting
languages (such as win32's py2exe) but I would venture a guess that it
would be tedious and less effective than armoring a C/C++ based executable.

To turn the argument the other way round, if we accept what you say as
correct within the realm of web applications, the Ruby-On-Rails and
Django guys (to name but two) are in a serious folly and are not able to
provide secure frameworks owing to their choice of scripting languages.
I, for one, do not that this is the case :-)

sc-l-requ...@securecoding.org wrote:

Message: 6 Date: Thu, 18 Mar 2010 15:11:29 -0400 From: ljknews
<ljkn...@mac.com> To: sc-l@securecoding.org Subject: Re: [SC-L] market
for training CISSPs how to code (Matt, Parsons) Message-ID:
<p05200f40c7c82b12b...@[146.115.107.213]> Content-Type: text/plain;
charset=us-ascii At 7:36 PM +0200 3/18/10, AK wrote:

> > Who says so, in the context of web applications?
> > I can see it (somewhat) from a "desktop" application
> > perspective, but how is this relevant in web apps?
>   

Why should standards for a "web" application be different than
for a "desktop" application ?
-- Larry Kilgallen

_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to