The US National Security Agency (NSA) announces it has made its GHIDRA Software Reverse Engineering (SRE) framework available as open source. Key features of Ghidra are:
The framework can be downloaded from https://ghidra-sre.org/. The page has a button labeled "SHA-256" but it seems to require Javascript for it to be displayed. A simple "view source" (you don't think I'm gonna let the NSA have execution permission on my computer!) of the page revealed:
3b65d29024b9decdbb1148b12fe87bcb7f3a6a56ff38475f5dc9dd1cfc7fd6b2 ghidra_9.0_PUBLIC_20190228.zip
Alternatively, it also seems to be available on GitHub.
What I really want to know is how are you supposed to pronounce its name?
(Score: 2) by MichaelDavidCrawford on Wednesday March 06 2019, @08:32AM (7 children)
Or perhaps a test tool, I am symantically unclear.
How much do you suppose Larry Ellison would pay for a Ghidra-Resistant Binary Executable Shrouder?
I'm gonna get me some $$$$$ pussy now!
Yes I Have No Bananas. [gofundme.com]
(Score: 2) by ls671 on Wednesday March 06 2019, @08:59AM (1 child)
You don't get it. It is a trojan gift to us all. Who is going to reverse engineer the reverse engineering tool anyway :)
Everything I write is lies, including this sentence.
(Score: 3, Interesting) by c0lo on Wednesday March 06 2019, @12:04PM
MDC volunteered. For $$$$$ pussy.
https://www.youtube.com/@ProfSteveKeen https://soylentnews.org/~MichaelDavidCrawford
(Score: 3, Interesting) by JoeMerchant on Wednesday March 06 2019, @01:06PM (4 children)
Code obfuscation isn't all that hard, if you don't care about performance. I thought this was evident in Oracle, Microsoft, and many other products since they were introduced.
🌻🌻🌻🌻 [google.com]
(Score: 4, Funny) by DannyB on Wednesday March 06 2019, @03:29PM (3 children)
Wait . . . are you saying Oracle and Microsoft code are deliberately obfuscated? I thought that was just the way they wrote software badly. Are you sure they go to an extra step to obfuscate?
Infinity is clearly an even number since the next higher number is odd.
(Score: 2) by sjames on Wednesday March 06 2019, @09:23PM
Microsoft takes it to the next level. Even with the documentation in front of you, it's still obfuscated through 12 pages of non-optional parameters all with names that read like they should mean something but what that something might be is a bit of a mystery. Sometimes it's apparently a mystery even to MS.
(Score: 2) by JoeMerchant on Wednesday March 06 2019, @09:31PM
It comes from the top-down. Chair throwing is a great way to increase obfuscation the code your developers are producing. Unrealistic launch deadlines, commodity developers, 99.9% legacy support, competing silos, there are plenty of ways that management can cause the code to become more obfuscated without ever having to go down to the developer level themselves.
🌻🌻🌻🌻 [google.com]
(Score: 0) by Anonymous Coward on Thursday March 07 2019, @01:10AM
It is called optimization, and name stripping
https://docs.microsoft.com/en-us/cpp/build/reference/o-options-optimize-code?view=vs-2017 [microsoft.com]
It may mangle the code a bit.