Главная
Study mode:
on
1
Intro
2
What are needed in reversing?
3
What we have now?
4
About Ghidra
5
BinCraft - Dedication (cont.)
6
BinCraft - what
7
ghidracraft - what done
8
About Decompilation
9
Ghidra Decompiler C++
10
Problems in Decompilation
11
Magic Functions
12
Default Var names
13
Analysis Failure
14
Minor Bugs
15
Pcode Patch
16
Modernized UI
17
What to be done
18
Graal VM impl. stages.
19
Lessons Learned
Description:
Explore the advancements in Ghidra, the NSA's open-source reverse engineering tool, in this Hack In The Box Security Conference talk. Delve into BinCraft, a project aimed at modernizing Ghidra by addressing historical issues, fixing bugs, and integrating cutting-edge techniques like GraalVM. Learn about improvements in decompilation, particularly for C++, and discover solutions to common problems such as analysis failures and default variable naming. Gain insights into the implementation of a modernized UI and future plans for Ghidra's evolution. Benefit from the speaker's expertise as a CTF team leader and StarCross Portal Lab researcher, and understand the key lessons learned in taking Ghidra to the next level.

Taking Ghidra to the Next Level

Hack In The Box Security Conference
Add to list
0:00 / 0:00