• [object Object]@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    1
    ·
    4 days ago

    For network calls, they probably have socket related system calls in the binary file, that would be my second step in reversing. First step would be to try things like Wireshark to intercept the network calls only, as that would be a lot cleaner.

    • Flyswat@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      1 day ago

      When you say “intercept the network calls” with Wireshark, are you able to hook Wireshark to a selected binary so that it shows its network traffic?

      • [object Object]@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        I don’t really know much about how capable Wireshark filtering is to be honest. I usually can filter out what I think are background noises, and it has been enough for me so far. No clue if Wireshark allows filtering by process ID.