Reverse Engineering and Code Emulation with Ghidra

Presented at SAINTCON 2019, Oct. 22, 2019, 2 p.m. (30 minutes).

The NSA recently open-sourced the Ghidra software reverse engineering tool. While it's unlikely to steal IDA-heads, Binjas, or those 5 people who remember Radare2's command line, it is a mature RE tool with a huge feature set. It's also easily extensible through Java, Python, and a command line batch mode. This talk will introduce Ghidra briefly, then demonstrate/release an open-source Ghidra intermediate language emulation capability, and finally describe the basics of extending Ghidra via Python scripting.


Presenters:

  • Karl Sickendick - US Air Force
    Electrical Engineer, Computer Scientist, experienced cyber capability developer, Air Force Officer, recently assigned to Idaho National Labs as an Air Force Fellow

Links:

Similar Presentations: