Tools used in Windows Thick client pentesting #
Information Gathering #
- CFF explorer (https://ntcore.com/?page_id=388)
- SysInternal Suite (https://learn.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite)
- Strings
- Process Monitor
- Process Explorer
- Sigcheck
Decompile and Debug #
- DnSpy (https://github.com/dnSpy/dnSpy/releases)
- ILSpy (https://github.com/icsharpcode/ILSpy/releases)
- DotPeek (https://www.jetbrains.com/decompiler/download/#section=web-installer)
- Frida (https://github.com/frida/frida/releases)
- Ghidra (https://github.com/NationalSecurityAgency/ghidra/releases)
- WinDbg (https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-download-tools)
Network sniffing and Proxy #
- Wireshark (https://www.wireshark.org/download.html)
- TCPView (https://learn.microsoft.com/en-us/sysinternals/downloads/tcpview)
- EchoMirage (https://sourceforge.net/projects/echomirage.oldbutgold.p/)
- Burp Suite NoPE proxy
- Fiddler (https://www.telerik.com/fiddler/fiddler-classic)
- MiTM relay (https://github.com/jrmdev/mitm_relay)
System Testing #
- Symbolic Link Testing tools (https://github.com/googleprojectzero/symboliclink-testing-tools)