YoVDO

Taking Ghidra to the Next Level

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Reverse Engineering Courses Ghidra Courses Decompilation Courses GraalVM Courses Binary Analysis Courses

Course Description

Overview

Explore the advancements in Ghidra, the NSA's open-source reverse engineering tool, in this Hack In The Box Security Conference talk. Delve into BinCraft, a project aimed at modernizing Ghidra by addressing historical issues, fixing bugs, and integrating cutting-edge techniques like GraalVM. Learn about improvements in decompilation, particularly for C++, and discover solutions to common problems such as analysis failures and default variable naming. Gain insights into the implementation of a modernized UI and future plans for Ghidra's evolution. Benefit from the speaker's expertise as a CTF team leader and StarCross Portal Lab researcher, and understand the key lessons learned in taking Ghidra to the next level.

Syllabus

Intro
What are needed in reversing?
What we have now?
About Ghidra
BinCraft - Dedication (cont.)
BinCraft - what
ghidracraft - what done
About Decompilation
Ghidra Decompiler C++
Problems in Decompilation
Magic Functions
Default Var names
Analysis Failure
Minor Bugs
Pcode Patch
Modernized UI
What to be done
Graal VM impl. stages.
Lessons Learned


Taught by

Hack In The Box Security Conference

Related Courses

Reverse Engineering 3201: Symbolic Analysis
OpenSecurityTraining2 via Independent
Threat Hunting with Yara
Pluralsight
Mastering x86-64 Real Assembly Language from Zero | ASM+
Udemy
Mastering Reverse Engineering & Malware Analysis | REMASM+
Udemy
angr: Binary Analysis Framework - Demonstration and Analysis
New York University (NYU) via YouTube