NSA to release a free reverse engineering tool known as GHIDRA that to demonstrated in the RSA conference 2019 that going to held at Mar 05 in Moscone Center, San Francisco.
The reverse engineering tool developed in Java and works with windows, OS X, Linux and mobile devices. To run it requires Java 1.7 to be installed on the machine.
“The tool is a GUI based one which enables which enables the reverse engineers to leverage an integrated set of features. The GHIDRA platform includes all the features expected in high-end commercial tools, with new and expanded functionality NSA uniquely developed, and will be released for free public use at RSA.”
The current version of Ghidra is 7.0.2 and the tool has options to include additional functionality such as Cryptanalysis, interaction with OllyDbg, the Ghidra Debugger.
Ghidra is a reverse engineering tool like IDA Pro which is widely used for decompiling applications. IDA Pro written in C++.
NSA open sourced number of internal tools, after March 5 the tool expected to be available NSA Github repositories.
Former NSA staffer, security researcher Charlie Miller said that the tool being used by NSA 13 years ago.
A reddit user hash_define details the differences between the reverse engineering tools Ghidra and the IDA.
According to ZDNet who contacted US government workers for comment, “the tool is well-known and liked, and generally used by operators in defensive roles, who normally analyze malware found on government networks.”