Saturday, December 2, 2023

Ghidra – Free Reverse Engineering Tool Released by NSA

NSA released Ghidra a free reverse Engineering tool for Malware analyst with an interactive GUI capability that runs on various platforms including Windows, Mac OS, and Linux and supports a number of processor modules.

Ghidra gives flexibility for users to create additional plug-in components and scripts using Java or Python. It helps in analyzing malicious codes, malware and gives cybersecurity professionals a better understanding of potential vulnerabilities in their networks and systems.

It is a reverse engineering tool like IDA Pro which is widely used for decompiling applications. The free tool includes all the features expected in high-end commercial tools.

Ghidra is capable of analyzing libraries written in a variety of architectures and can be extended by adding plugins.

Installing Ghidra is quite simple, just need to download the zip file and click Extract All, then navigate to the extracted follow and run the batch. Ghidra can be downloaded from the official website.

Ghidra includes following capabilities that include disassembly, assembly, decompilation, graphing and scripting. It supports for a number of executable formats and can be run in both user-interactive and automated modes.

Installation Guide Credits : NSA

Malwaretech published the first look video of Ghidra.

Initial Announcement –Ghidra

NSA to release a free reverse engineering tool known as GHIDRA that to demonstrate in the RSA conference 2019 that going to held at Mar 05 in Moscone Center, San Francisco.

The reverse engineering tool developed in Java and works with Windows, OS X, Linux, and mobile devices. To run it requires Java 1.7 to be installed on the machine.

“The tool is a GUI based one which enables which enables the reverse engineers to leverage an integrated set of features. The platform includes all the features expected in high-end commercial tools, with new and expanded functionality NSA uniquely developed, and will be released for free public use at RSA.”

The current version of the tool is 9.0. and the tool has options to include additional functionality such as Cryptanalysis, interaction with OllyDbg, the Ghidra Debugger.

NSA open sourced number of internal tools, after March 5 the tool expected to be available NSA Github repositories.

Former NSA staffer, security researcher Charlie Miller said that the tool being used by NSA 13 years ago.

A reddit user hash_define details the differences between the reverse engineering tools Ghidra and the IDA.

byu/rolfr from discussion

US government workers comment that “the tool is well-known and liked, and generally used by operators in defensive roles, who normally analyze malware found on government networks.”

You can find the list of important and most used Threat Intelligence Tools by security professionals.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.


Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles