cageymaru
Fully [H]
- Joined
- Apr 10, 2003
- Messages
- 22,113
The US National Security Agency (NSA) is scheduled to release the "GHIDRA" reverse engineering tool that allows researchers to disassemble executable files into assembly code that can be read and analysed. This will allow members of cyber defense teams around the world to peer into the inner workings of malware strains and rogue software. GHIDRA was mentioned in the WikiLeaks document release from 2017. NSA Senior Advisor, Robert Joyce will give a talk and discuss the tool at the RSA Conference on March 6, 2019 in San Francisco, CA. According to Catalin Cimpanu of ZDNET, the tool is expected be available as open source on the code page for the NSA and its Github repository at the time of its release.
NSA has developed a software reverse engineering framework known as GHIDRA, which will be demonstrated for the first time at RSAC 2019. An interactive GUI capability enables reverse engineers to leverage an integrated set of features that run on a variety of platforms including Windows, Mac OS and LINUX and supports a variety of processor instruction sets. The GHIDRA platform includes all the features expected in high-end commercial tools, with new and expanded functionality NSA uniquely developed, and will be released for free public use at RSA.
NSA has developed a software reverse engineering framework known as GHIDRA, which will be demonstrated for the first time at RSAC 2019. An interactive GUI capability enables reverse engineers to leverage an integrated set of features that run on a variety of platforms including Windows, Mac OS and LINUX and supports a variety of processor instruction sets. The GHIDRA platform includes all the features expected in high-end commercial tools, with new and expanded functionality NSA uniquely developed, and will be released for free public use at RSA.