*Updated for 2020 v9.1.2*
Ghidra, an NSA tool recently published by the NSA is a software “reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission." I decided to do this tutorial because there is (at this time) limited English directions for the amateur available.
Now, this tool is open-source and hosted on Github for transparency. The source code is not kept a secret, but many people are probably skeptical of installing NSA applications on their machines anyway. With the occurrence of the Shadow Brokers and the inevitable future exposure of NSA applications, I do not think this is the last time an NSA application will be made public for the "greater good". So, let's benefit, and review the software installation for Windows 10 below.
I have added some screenshots to the default Ghidra installation steps to help those who want to streamline deployment.
1) Download https://ghidra-sre.org/ghidra_9.1.2_PUBLIC_20200212.zip
2) Extract the file to your desired location (this is a no-install Java executable).
3) Modify the Java execution path by:
- Search for Advanced System Settings at the start menu.
- Click on Environment Variables.
- Add the JDK bun directory to the PATH variable.
- At the end of the the Variable value field, add a new line, with the path of extracted JDK dir>\bin.
4) Ghidra should now open without issue. Please email me or comment if you have questions or suggestions!
Comments
Post a Comment