The US NSA will release a free reverse engineering tool at the upcoming RSA Security Conference to be held in early March in San Francisco.
His name software it's GHIDRA and technically, it's a disassembler. The application converts executable files into assembly code that can be analyzed by interested parties.
The NSA developed GHIDRA in the early 2000s and in recent years has shared it with other US government agencies. services that need to examine the inner workings of malicious or suspicious software.
The existence of GHIDRA was never a state secret, but we learned about this in March of 2017 when WikiLeaks published the Vault7, a collection of stolen CIA records. The CIA was one of the organizations that had access to the tool.
GHIDRA is written in Java, has a GUI and runs on Windows, Mac and Linux.
It can parse binaries for all major operating systems such as Windows, Mac, Linux, Android and iOS, while its modular architecture allows users to add packages if additional features are needed.
According to description of GHIDRA at the intro session of the RSA conference, the tool “includes all the features expected in high-end commercial tools technology, με νέες και διευρυμένες λειτουργίες που ανέπτυξε η NSA”.
Users who have already tried GHIDRA say they are slower than IDA, but their open nature allows for improvements and NSA will of course benefit from free application maintenance from the open source community.
In total, the NSA has opened 32 projects and has an official GitHub account.
GHIDRA will be presented at the RSA conference on March 5 and is expected to be released soon on σελίδα -- of the organization but also in their account at GitHub.
_____________________
- What is RAID? Guide for Beginners
- What is Software, Hardware and Motherboard RAID? Guide for Beginners