Hola:
Si la aplicación no tiene una subrutina anti debuging, se debería ver algo en la consola.
En mi caso suelo buscar el icono, o también lo pongo temporal en el escritorio, y con el botón derecho del ratón me voy a propiedades, ahí se encuentran esos datos , mas los permisos, etc .
También hay que procurar mirar en gestión de usuarios en yast, por si hay algún grupo referente a la aplicación, si es así hay que ponerse en ese grupo.
Por lo general suele aparecer algo en la consola, si la cantidad de texto o información es mucha, se puede redirigir a un fichero de texto :
o sea ejecutable > /home/frank/Documentos/programa.txt .
Lo mas sencillo es usar un programa de depuración o de debugin , como puede ser strace o ltrace si son librerías, o si el programa ya tiene el suyo propio usar el que tenga .
Para strace y ltrace ver las opciones con strace --help y lo mismo para ltrace --help :
Código:
HP-OMEN:~ # strace --help
usage: strace [-ACdffhikqqrtttTvVwxxyyzZ] [-I n] [-b execve] [-e expr]...
[-a column] [-o file] [-s strsize] [-X format] [-P path]...
[-p pid]... [--seccomp-bpf]
{ -p pid | [-D] [-E var=val]... [-u username] PROG [ARGS] }
or: strace -c[dfwzZ] [-I n] [-b execve] [-e expr]... [-O overhead]
[-S sortby] [-P path]... [-p pid]... [--seccomp-bpf]
{ -p pid | [-D] [-E var=val]... [-u username] PROG [ARGS] }
Output format:
-A open the file provided in the -o option in append mode
-a column alignment COLUMN for printing syscall results (default 40)
-i print instruction pointer at time of syscall
-k obtain stack trace between each syscall
-o file send trace output to FILE instead of stderr
-q suppress messages about attaching, detaching, etc.
-qq suppress messages about process exit status as well.
-r print relative timestamp
-s strsize limit length of print strings to STRSIZE chars (default 32)
-t print absolute timestamp
-tt print absolute timestamp with usecs
-T print time spent in each syscall
-v verbose mode: print entities unabbreviated
-x print non-ascii strings in hex
-xx print all strings in hex
-X format set the format for printing of named constants and flags
-y print paths associated with file descriptor arguments
-yy print protocol specific information associated with socket
file descriptors
Statistics:
-c count time, calls, and errors for each syscall and report
summary
-C like -c but also print regular output
-O overhead set overhead for tracing syscalls to OVERHEAD usecs
-S sortby sort syscall counts by: time, calls, errors, name, nothing
(default time)
-w summarise syscall latency (default is system time)
Filtering:
-e expr a qualifying expression: option=[!]all or option=[!]val1[,val2]...
options: trace, abbrev, verbose, raw, signal, read, write, fault,
inject, status, kvm
-P path trace accesses to path
-z print only syscalls that returned without an error code
-Z print only syscalls that returned with an error code
Tracing:
-b execve detach on execve syscall
-D run tracer process as a detached grandchild, not as parent
-f follow forks
-ff follow forks with output into separate files
-I interruptible
1: no signals are blocked
2: fatal signals are blocked while decoding syscall (default)
3: fatal signals are always blocked (default if '-o FILE PROG')
4: fatal signals and SIGTSTP (^Z) are always blocked
(useful to make 'strace -o FILE PROG' not stop on ^Z)
Startup:
-E var remove var from the environment for command
-E var=val put var=val in the environment for command
-p pid trace process with process id PID, may be repeated
-u username run command as username handling setuid and/or setgid
Miscellaneous:
--seccomp-bpf enable seccomp-bpf filtering
-d enable debug output to stderr
-h, --help print help message
-V, --version print version
Si tiene la opción de guardar el log, pues usarla, si no strace programa > /home/frank/Documentos/programa-log.txt
Hay pag. por la web, que enseñan hacer debugin y análisis forense informático .
Saludos cordiales
Marcadores