Santoku Linux: the GNU / Linux distribution for mobile audits

SantokuLinux

SantokuLinux es a distribution that in addition to being called an indispensable Japanese knife for many cooks, it is also an indispensable tool for those who need to practice security audits on mobile devices. This type of audits is on the rise with the increase in the use of this type of elements and for this there is this distro.

Santoku Linux, along with Kali Linux and DEFT Linux, are three of the most powerful instruments to audit. With Santoku Linux we cover the part of smartphones and tables, although it also has other tools. As for the well-known Kali, it is very complete and is more oriented to pentesting, but it also has tools for forensic analysis, mobile audits could also be done, etc. Lastly, DEFT Linux is specially designed for forensic analysis.

Three very specialized distributions that will prevent us from downloading and installing packages for these tasks related to computer security. They bring everything you need and more ... Some of you may think that just one would be enough, that's a matter of taste. But for me it is better to use each of them in their field in which they are specialized.

Returning to Santoku Linux, the protagonist of this article, say that includes three basic sections: forensic analysis oriented to mobile devices (with a multitude of official OS images, tools for the analysis of ROM, RAM, ...), malware analysis on mobile devices and finally the security analysis on these devices. And all of it downloadable from the project website.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.