Automating Binary Analysis with Ghidra's P-Code
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore the power of automating binary analysis using Ghidra's P-Code in this informative conference talk from BruCON 0x0D. Dive into the world of Ghidra, a free and open-source software reverse engineering framework, and discover its potential for creating sophisticated binary analysis tools. Learn about Ghidra's API and SDK capabilities, and understand how to leverage P-Code, Ghidra's intermediate language, for architecture-independent analysis. Follow along as the speaker demonstrates the process of building scripts and tools, starting from simple examples and progressing to more complex scenarios. Gain insights into the benefits of using Ghidra for automated binary analysis, including its open-source nature and extensive architecture support. Whether you're a seasoned reverse engineer or new to the field, this talk offers valuable knowledge on harnessing Ghidra's features for your next binary analysis project.
Syllabus
Intro
Overview
Ghidra
What is Ghidra
Script Manager
Python vs Java
Headless Mode
Flat Program API
Program API
What is PCode
Enabling PCode
High P Code
Why PCode
Component Object Model
Summary
References
Questions
Taught by
BruCON Security Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network