Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Infrastructure Security

06:00 AM
Larry Loeb
Larry Loeb
Larry Loeb

InfoSec Community Excited as NSA Releases Ghidra 9.0 to the Public

At the RSA Conference in San Francisco this week, the National Security Agency released to the public one of its internal tools, Ghidra 9.0, which is used for software reverse engineering. The NSA has been using it internally for a decade.

At the RSA Conference in San Francisco this week, the National Security Agency released to the public one of its internal tools, Ghidra 9.0, which is used for software reverse engineering. The NSA has been using it internally for a decade.

Reverse engineering software changes the ones and zeros computers understand back into a human-readable structure. The point is to show what that clump of binary code actually does.

It is currently available at the official website, along with supporting documentation. NSA says that it will release the source code under an open source license on GitHub.

Ghidra is written in Java, and requires 4 GB RAM along with 1 GB storage for installed Ghidra binaries. It works on Windows, Mac and Linux.

It will work on the following processors at the moment: X86 16/32/64, ARM/AARCH64, PowerPC 32/64, VLE, MIPS 16/32/64,micro, 68xxx, Java/DEX bytecode, PA-RISC, PIC 12/16/17/18/24, Sparc 32/64, CR16C, Z80, 6502, 8051, MSP430, AVR8 and AVR32.

Ghidra is developed and tested against the OpenJDK (Java development kit) that is distributed from jdk.java.net. The NSA says that using this OpenJDK distribution gives the most stable experience. Ghidra is a direct competitor to IDA Pro, a commercial program that has required usage fees in the thousands of dollars per year besides having an intrusive buyer qualification process. IDA -- which has a debugger not yet present in Ghidra -- has been the only real game in town until now. Yet, Ghidra supports MIPS (Microprocessor without Interlocked Pipelined Stages) decompiling for RISC computers which IDA Pro does not.

Response to the release by the infosec community as expressed on Twitter, has been overwhelmingly positive.

Maddie Stone, who reverse engineers for Google, was positively giddy there. "Ghidra's out and we've got those ARM proc modules, the UNDO button, and the ability to collaborate on analysis... for FREE!" she said.

The Undo/redo functionality seems to be a particular favorite of many. It allows someone to try out an idea without messing up what they have previously saved.

Of course, the community came up with an initial bug. A London-based hacker found what could be a way to backdoor the tool. "Ghidra opens up JDWP in debug mode listening on port 18001, you can use it to execute code remotely," he said on Twitter.

But, this behavior seems to be a condition that only happens in debug mode. It does not happen when Ghidra is in normal mode. It can be easily fixed by changing one line of code as well.

The NSA has previously made tools available to the public through its Technology Transfer Program (TTP). Security-Enhanced Linux and Security-Enhanced Android are but two of the examples.

Having Ghidra available to the public at no cost may well be a decisive marker in cybersecurity defense. This will widely distribute a professional quality analytic tool that gives the community a way to fight back at attacks by understanding them.

This isn't done yet, not by a long shot.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-09-26
btcpayserver is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
PUBLISHED: 2021-09-25
There is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.
PUBLISHED: 2021-09-24
Shopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.
PUBLISHED: 2021-09-24
A Cross-Site Request Forgery (CSRF) in Maccms v10 via admin.php/admin/admin/del/ids/<id>.html allows authenticated attackers to delete all users.
PUBLISHED: 2021-09-24
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP trap supplied data. By creating a malicious SNMP trap, an attacker can store an XSS payload which will trigger when a user of the web UI views the events list page. This issue was fixed in ver...