Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Wednesday March 06 2019, @08:12AM   Printer-friendly
from the I'm-not-gonna-try-it...YOU-try-it! dept.

The US National Security Agency (NSA) announces it has made its GHIDRA Software Reverse Engineering (SRE) framework available as open source. Key features of Ghidra are:

  • includes a suite of software analysis tools for analyzing compiled code on a variety of platforms including Windows, Mac OS, and Linux
  • capabilities include disassembly, assembly, decompilation, graphing and scripting, and hundreds of other features
  • supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes
  • users may develop their own Ghidra plug-in components and/or scripts using the exposed API

The framework can be downloaded from https://ghidra-sre.org/. The page has a button labeled "SHA-256" but it seems to require Javascript for it to be displayed. A simple "view source" (you don't think I'm gonna let the NSA have execution permission on my computer!) of the page revealed:

3b65d29024b9decdbb1148b12fe87bcb7f3a6a56ff38475f5dc9dd1cfc7fd6b2 ghidra_9.0_PUBLIC_20190228.zip

Alternatively, it also seems to be available on GitHub.

What I really want to know is how are you supposed to pronounce its name?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Funny) by DannyB on Wednesday March 06 2019, @03:29PM (3 children)

    by DannyB (5839) Subscriber Badge on Wednesday March 06 2019, @03:29PM (#810728) Journal

    Wait . . . are you saying Oracle and Microsoft code are deliberately obfuscated? I thought that was just the way they wrote software badly. Are you sure they go to an extra step to obfuscate?

    --
    The lower I set my standards the more accomplishments I have.
    Starting Score:    1  point
    Moderation   +2  
       Funny=2, Total=2
    Extra 'Funny' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 2) by sjames on Wednesday March 06 2019, @09:23PM

    by sjames (2882) on Wednesday March 06 2019, @09:23PM (#810874) Journal

    Microsoft takes it to the next level. Even with the documentation in front of you, it's still obfuscated through 12 pages of non-optional parameters all with names that read like they should mean something but what that something might be is a bit of a mystery. Sometimes it's apparently a mystery even to MS.

  • (Score: 2) by JoeMerchant on Wednesday March 06 2019, @09:31PM

    by JoeMerchant (3937) on Wednesday March 06 2019, @09:31PM (#810876)

    Are you sure they go to an extra step to obfuscate?

    It comes from the top-down. Chair throwing is a great way to increase obfuscation the code your developers are producing. Unrealistic launch deadlines, commodity developers, 99.9% legacy support, competing silos, there are plenty of ways that management can cause the code to become more obfuscated without ever having to go down to the developer level themselves.

    --
    🌻🌻 [google.com]
  • (Score: 0) by Anonymous Coward on Thursday March 07 2019, @01:10AM

    by Anonymous Coward on Thursday March 07 2019, @01:10AM (#810956)

    It is called optimization, and name stripping

    https://docs.microsoft.com/en-us/cpp/build/reference/o-options-optimize-code?view=vs-2017 [microsoft.com]

    It may mangle the code a bit.