GHIDRA 9.0 | Powerful Reverse Engineering Tool | National Security Agency

-MteDzlXVGA/default.jpg

NSA Releases GHIDRA 9.0 — Free, Powerful Reverse Engineering Tool.

The United States' National Security Agency (NSA) today finally released GHIDRA version 9.0 for free, the agency's home-grown classified software reverse engineering tool that agency experts have been using internally for over a decade to hunt down security bugs in software and applications.
GHIDRA is a Java-based reverse engineering framework that features a graphical user interface (GUI) and has been designed to run on a variety of platforms including Windows, macOS, and Linux.
Reverse engineering a program or software involves disassembling, i.e. converting binary instructions into assembly code when its source code is unavailable, helping software engineers, especially malware analysts, understand the functionality of the code and actual design and implementation information.

The existence of GHIDRA was first publicly revealed by WikiLeaks in CIA Vault 7 leaks, but the NSA today publicly released the tool for free at the RSA conference, making it a great alternative to expensive commercial reverse engineering tools like IDA-Pro.

Download: https://ghidra-sre.org/

GHIDRA has received a warm welcome by the infosec community, and researchers and developers have already started contributing to the project by reporting bugs and security holes on its Github issue tracker.
Matthew Hickey, who uses online alias "HackerFantastic," being the first to report a security issue in GHIDRA.
Hickey noticed that the reverse engineering suit opens JDWP debug port 18001 for all interfaces when a user launches GHIDRA in the debug mode, allowing anyone within the network to remotely execute arbitrary code on the analysts' system.
Although the debug mode is not activated by default and supposed to work like intended, the software should listen only to debug connections from the localhost, rather than any machine in the network.

Want to join the Penetration Testing community? Join our Discord server!
https://discordapp.com/invite/rrRQGnJ

Do you enjoy the content on this channel? YouTube ad revenue is virtually non-existent so please consider funding Penetration Testing via Patreon:
https://www.patreon.com/penetrationte...

Facebook Page: https://www.facebook.com/kaliforensics

Pinterest: https://www.pinterest.com/penetration...

Instagram: https://www.instagram.com/penetration...

Google+: https://plus.google.com/b/10053333383...

Thanks For Watching....

Like Share & Subscribe.....

-MteDzlXVGA/default.jpg
GHIDRA 9.0 | Powerful Reverse Engineering Tool | National Security Agency GHIDRA 9.0 | Powerful Reverse Engineering Tool | National Security Agency Reviewed by Anonymous on March 07, 2019 Rating: 5