Many desktop applications deal with sensitive information that can be disastrous if it falls into the wrong hands. Hence these applications have built-in authentication and authorization controls, but those controls can be often bypassed by various techniques. SQAConsultant cybersecurity team specializes in techniques to bypass authentication and authorization checks. We use our knowledge to verify that an attacker has no way to access the data and functionality not intended for them. Furthermore, we thoroughly analyze the strength of checks that are implemented to prevent the information from being extracted from the files used by the application. We also check if there is any way to evade encryption or file integrity protection that may be placed on the configuration files used by the desktop application.