

Beschreibung
A guide to using the Ghidra software reverse engineering tool suite. The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency''s most challenging reverse-engineering problems. ...A guide to using the Ghidra software reverse engineering tool suite.
The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency''s most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the world''s most capable disassemblers and intuitive decompilers is now in the hands of cybersecurity defenders everywhere -- and <The Ghidra Book< is the one and only guide you need to master it.
In addition to discussing RE techniques useful in analyzing software and malware of all kinds, the book thoroughly introduces Ghidra''s components, features, and unique capacity for group collaboration. You''ll learn how to:
<lNavigate a disassembly
</l<lUse Ghidra''s built-in decompiler to expedite analysis
</l<lAnalyze obfuscated binaries
</l<lExtend Ghidra to recognize new data types
</l<lBuild new Ghidra analyzers and loaders
</l<lAdd support for new processors and instruction sets
</l<lScript Ghidra tasks to automate workflows
</l<lSet up and use a collaborative reverse engineering environment
</l
Designed for beginner and advanced users alike, <The Ghidra Book< will effectively prepare you to meet the needs and challenges of RE, so you can analyze files like a pro.
Autorentext
Kara Nance is a private security consultant. She has been a professor of computer science for many years. She has served on the Honeynet Project Board of Directors and given numerous talks at conferences around the world. She enjoys building Ghidra extensions and regularly provides Ghidra training.
Chris Eagle has been reverse engineering software for 40 years. He is the author of The IDA Pro Book (No Starch Press) and is a highly sought-after provider of reverse engineering training. He has published numerous reverse engineering tools and given talks at conferences such as Blackhat, Defcon, and Shmoocon.
Klappentext
A guide to using the Ghidra software reverse engineering tool suite.
DANCE WITH THE DRAGON
The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency’s most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the world’s most capable disassemblers and intuitive decompilers is now in the hands of cybersecurity defenders everywhere—and The Ghidra Book, 2nd edition, is the one and only guide you need to master it.
In addition to discussing RE techniques useful in analyzing software and malware of all kinds, the book thoroughly introduces Ghidra’s components, features, and unique capacity for group collaboration.
You’ll learn how to:
Set up and use a collaborative reverse engineering environment
Designed for beginner and advanced users alike, The Ghidra Book, 2nd edition, will effectively prepare you to meet the needs and challenges of RE, so you can analyze files like a pro.
New to this edition: This updated edition reflects the continued evolution of the open source project and brings readers up to speed with expanded real-world examples, new tools like PyGhidra and BSim, enhanced debugger capabilities, and seamless IDE integration. Clear, practical examples are woven into every chapter, helping you leverage Ghidra’s growing ecosystem and modern development environments to their fullest potential.
Inhalt
Acknowledgments
Introduction
Part I: Getting Started
Chapter 1: Introduction to Disassembly
Chapter 2: Reversing and Disassembly Tools
Chapter 3: Meet Ghidra
Part II: Basic Ghidra Usage
Chapter 4: Beginning Your Analysis
Chapter 5: Exploring Ghidra's Data Displays
Chapter 6: Making Sense of a Disassembly
Chapter 7: Refining a Disassembly
Chapter 8: Working with Data Types and Data Structures
Chapter 9: Understanding Cross-References
Chapter 10: Using Graph Views
PART III: Customizing and Extending Ghidra
Chapter 11: Using Ghidra Collaboratively
Chapter 12: Customizing Ghidra
Chapter 13: Extending Ghidra's Worldview
Chapter 14: Basic Scripting with Ghidra and PyGhidra
Chapter 15: Integrated Scripting with Eclipse and GhidraDev
Chapter 16: Running Ghidra in Headless Mode
Part IV: A Deeper Dive
Chapter 17: Loaders
Chapter 18: Processors
Chapter 19: The Decompiler
Chapter 20: Compiler Variations
PART V: Real-World Applications
Chapter 21: Obfuscation and Emulation
Chapter 22: Patching Binaries
Chapter 23: BSim and Other Comparison Tools
Appendix: Ghidra for IDA Users