Tools used in Linux Thick client pentesting #
Information Gathering #
- file (https://man7.org/linux/man-pages/man1/file.1.html)
- ldd (https://man7.org/linux/man-pages/man1/ldd.1.html)
- strings (https://man7.org/linux/man-pages/man1/strings.1.html)
- apt (https://manpages.ubuntu.com/manpages/xenial/man8/apt.8.html)
- strace (https://man7.org/linux/man-pages/man1/strace.1.html)
- ltrace (https://man7.org/linux/man-pages/man1/ltrace.1.html)
- pspy (https://github.com/DominicBreuker/pspy)
Reverse Engineering #
- IDA/IDA Pro (https://hex-rays.com/ida-free/, https://hex-rays.com/ida-pro/)
- Ghidra (https://github.com/NationalSecurityAgency/ghidra)
Memory Analysis #
- gcore (https://man7.org/linux/man-pages/man1/gcore.1.html)
- kill (https://man7.org/linux/man-pages/man1/kill.1.html)
- Procdump (https://github.com/Sysinternals/ProcDump-for-Linux)
- gdb (https://man7.org/linux/man-pages/man1/gdb.1.html)
Traffic Analysis #
- Wireshark (https://www.wireshark.org/)
- Tshark (https://www.wireshark.org/docs/man-pages/tshark.html)
- tcpdump (https://www.tcpdump.org/manpages/tcpdump.1.html)
- proxychains (https://github.com/haad/proxychains)
- Burp Suite (https://portswigger.net/burp)
- mitm relay (https://github.com/jrmdev/mitm_relay)