Follow

will make available soon to the public as an open source release. Long time I didn't had fun with assembly, but curious to have a look at this software reverse engineering framework 😎 nsa.gov/resources/everyone/ghi

@alx
What's Ghidra?

Edit:

> Ghidra is a software reverse engineering (SRE) framework developed by NSA's Research Directorate for NSA's cybersecurity mission. It helps analyze malicious code and malware like viruses, and can give cybersecurity professionals a better understanding of potential vulnerabilities in their networks and systems.

Oooh! :blobcat: a new toy! :blobcatreach:

If you want to play early with this new toy, for now I recommend to run it into a VM, and under control network. It’s a gift from NSA, so must be prudent 😂
From what I seen they are already some possible backdoor with default config of JDWP in debug mode listening on port 18001 that can be exploited to execute code remotely ...
More info here : mobile.twitter.com/hackerfanta

One more thing : they are a hidden message inside Ghidra logo, for the ones that want some fun 😇

Sign in to participate in the conversation
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.