Ghidra uses the concept of workspaces to hold your work. Once you have told Ghidra where you have JDK you should see something similar to the window below. In my case I extracted the tar into ~/Documents/Ghidra/ with tar -xvf openjdk-12+32_linux-圆4_ ghidraRun the first time will require you to tell Ghidra where your OpenJDK is located. I am using Linux and currently OpenJDK 12. Ghidra is built with Java and the current version 9.0 requires at-least OpenJDK 11. This really comes from experience, and I think that's the advantage the other tools have over Ghidra at this time.įirst I will explain my environment, you would need to adopt this to current versions or systems you might be using. Knowing how to quickly use and interpret that displayed information to come to a conclusion is the advantage of one tool over the next. If doing a straight comparison between tools, Ghidra does basically everything any other RE tool does, however each tool has a unique way to display information to the user. Instead, I wanted to concentrate on guiding someone with getting Ghidra setup and provide a quick example. I don't want to try to make comparison since every tool in the RE space has it's own advantages and disadvantages. I have also read a number of blog post and articles that try to compare Ghidra to these other tools, especially Ida Pro. Since the release I have played around with Ghidra for a number of hours and found it to be pretty comparable to existing tools that are used for software reverse engineering. The NSA recently released Ghidra, a powerful open source software reverse engineering tool. Ghidra - A quick start guide with pictures and a C++ example
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |