Understanding Ghidra
This project focuses on Ghidra, a software reverse engineering (SRE) suite of tools developed by the National Security Agency (NSA). The binaries were released at RSA Conference in March 2019 with the source code were published one month later on GitHub. It is seen by many security researchers as a competitor to IDA Pro and JEB Decompiler. The software is written in Java using the Swing framework for the GUI. Its decompiler is written in C++. Ghidra uses Jython so plugins can be developed in Python. Ghidra's existence was originally revealed to the public via WikiLeaks in March of 2017, but it remained unavailable until its declassification and official release two years later.
Problem Statement
With the recent release of a new software reverse engineering (SRE) suite of tools by the NSA, Ghidra is expected to be a great addition to a cyber defender's toolbox as developing competency on it will benefit one's cybersecurity skillset.
However, for a beginner, the tutorials available on the Internet assumes that they have the experience in reverse engineering and by extension, assembly language, which they clearly don't have and therefore will have difficulties understanding and using it.
This may lead to increased investigation timelines if used in real-life.
Project Deliverables
Guides - These guides allow the reader to gain a foundational theoretical knowledge such as Assembly Language and Reverse Engineering as well as set up the environment and tools required to complete the practicals
Practicals - These practicals allow the reader to demonstrate their knowledge about assembly language at the code analysis level of reverse engineering, as well as explore the features of Ghidra
Observations - These observations serve to document notes about the features of Ghidra, issues faced when using Ghidra, as well as the difference between Ghidra and other forensic tools such as IDA
Analysis Reports - These reports showcase on how Ghidra is used during the analysis of unknown malware samples using the full reverse engineering framework
Ghidra Extensions - A guide to developing extensions in Ghidra and source codes of plugins developed to extend the functionality of Ghidra
Tools Used
FireEye's Flare Forensics Virtual Machine
VMWare WorkStation
National Security Agency's Ghidra
Hex-Rays' Interactive Dissassembler (IDA)
Mircrosoft's Visual Studio 2019
Malware-DB / theZoo
FireEye's FakeNet-NG
FireEye's FLOSS
VirusTotal
Eclipse Interactive Developer Environment (IDE)