A software development team is concerned that a new product's 64-bit Windows binaries can be deconstructed to the underlying code.
Which of the following tools can a penetration tester utilize to help the team gauge what an attacker might see in the binaries?
Click on the arrows to vote for the correct answer
A. B. C. D.B.
https://en.wikipedia.org/wiki/OllyDbgThe correct answer to the question is either A. Immunity Debugger or B. OllyDbg. Both of these tools are commonly used as debuggers for Windows binaries and can be used by a penetration tester to help the software development team gauge what an attacker might see in the binaries.
When a program is compiled, it is translated from human-readable code (source code) into machine-readable code (binary code). Debuggers are tools that allow a user to step through a program's code, line by line, while it is running. This can be useful for identifying bugs or vulnerabilities in the program.
Immunity Debugger and OllyDbg are two popular Windows debuggers that can be used to deconstruct 64-bit Windows binaries. Both tools allow a user to step through a program's code, set breakpoints, view memory, and modify variables, among other things. By using a debugger, a penetration tester can gain insight into how a program works and what vulnerabilities it may have.
GDB is another popular debugger, but it is primarily used on Linux and other Unix-like operating systems. It can be used to debug Windows binaries using a plugin called GDB for Windows, but it is not as commonly used as Immunity Debugger or OllyDbg for this purpose.
Drozer, on the other hand, is not a debugger at all. It is a mobile application security testing framework that is used for testing Android applications. It is not relevant to the question at hand.
In summary, the most appropriate tools for a penetration tester to utilize in order to help a software development team gauge what an attacker might see in their 64-bit Windows binaries are Immunity Debugger or OllyDbg.