If we press OK and dismiss this window, and then double click the file we imported, this opens up Ghidra’s code browser utility. This opens up Ghidra’s code browser utility and asks if I want to analyse the file, then I press Yes and go on with the defaults.Īfter we import the file, we get some information about the binary file. I will go with the defaults.Īfter being presented with some info about the binary file, I press OK, select the file, and double click it. ![]() Then I import the challenge file by dragging it to the project folder. Let’s get started! I open up Ghidra and create a new Project which I call RootMe. If you want to give it try by yourself, then you should consider not reading this article because it will spoil the challenge from you. The challenge I’m solving is called ELF - CrackPass. In this article I will try to solve a simple CrackMe challenge that I’ve found on the website root-me. I don’t know what features to expect from a professional tool like this, if you’re looking to read about advanced Ghidra features this is likely not the article for you. I’m at the beginning of my reverse engineering career, so I didn’t do anything advanced. The official website describes the tool as: A software reverse engineering (SRE) suite of tools developed by NSA’s Research Directorate in support of the Cybersecurity mission. I’ve been playing recently a bit with Ghidra, which is a reverse engineering tool that was recently open sourced by the NSA. ![]() By Denis Nuțiu How I solved a simple CrackMe challenge with the NSA’s Ghidra
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |