Tools used in Linux Thick client pentesting #
Information Gathering #
- file (https://man7.org/linux/man-pages/man1/file.1.html
)
- ldd (https://man7.org/linux/man-pages/man1/ldd.1.html
)
- strings (https://man7.org/linux/man-pages/man1/strings.1.html
)
- apt (https://manpages.ubuntu.com/manpages/xenial/man8/apt.8.html
)
- strace (https://man7.org/linux/man-pages/man1/strace.1.html
)
- ltrace (https://man7.org/linux/man-pages/man1/ltrace.1.html
)
- pspy (https://github.com/DominicBreuker/pspy
)
Reverse Engineering #
- IDA/IDA Pro (https://hex-rays.com/ida-free/
, https://hex-rays.com/ida-pro/
)
- Ghidra (https://github.com/NationalSecurityAgency/ghidra
)
Memory Analysis #
- gcore (https://man7.org/linux/man-pages/man1/gcore.1.html
)
- kill (https://man7.org/linux/man-pages/man1/kill.1.html
)
- Procdump (https://github.com/Sysinternals/ProcDump-for-Linux
)
- gdb (https://man7.org/linux/man-pages/man1/gdb.1.html
)
Traffic Analysis #
- Wireshark (https://www.wireshark.org/
)
- Tshark (https://www.wireshark.org/docs/man-pages/tshark.html
)
- tcpdump (https://www.tcpdump.org/manpages/tcpdump.1.html
)
- proxychains (https://github.com/haad/proxychains
)
- Burp Suite (https://portswigger.net/burp
)
- mitm relay (https://github.com/jrmdev/mitm_relay
)