[HN Gopher] Ghidra: A software reverse engineering suite of tool...
       ___________________________________________________________________
        
       Ghidra: A software reverse engineering suite of tools developed by
       the NSA
        
       Author : NotSwift
       Score  : 331 points
       Date   : 2021-07-13 07:44 UTC (1 days ago)
        
 (HTM) web link (ghidra-sre.org)
 (TXT) w3m dump (ghidra-sre.org)
        
       | biscotte_ wrote:
       | CyberCHEF is another great tool coming from a "spying" agency. I
       | dont see how GCHQ could really benefit from it as there is even a
       | local version for those who would want to keep their data from
       | going over the wire.
        
       | one_shadow wrote:
       | Save
        
       | NotSwift wrote:
       | It is open source software and it can reverse engineer programs
       | from a lot of different systems.
       | 
       | Some people may be worried about installing a piece of software
       | on their computer that comes from the NSA. I don't think that
       | there are real reasons to worry. One of the tasks of the NSA is
       | defending against cyber attacks. Having more people with good
       | tools helps the defense. Also, you can be pretty certain that
       | some security people have been closely looking at the sources to
       | see if it contains any suspicious features. Besides, if the NSA
       | really wants to install some software on your computer, they can
       | probably do it themselves without your involvement.
        
         | tracedddd wrote:
         | I was quite suspicious of it when it was first announced, but
         | an open source RE tool is probably the stupidest place to put a
         | backdoor. Author considerations aside, it's a great tool, and
         | does pretty well with decompiling.
        
           | thedracle wrote:
           | I'm amazed at how often it does better than hexrays
           | decompiler wise.
           | 
           | It's pretty spectacular.
           | 
           | Radare2 has a plugin for using ghidra's decompiler too
           | https://github.com/radareorg/r2ghidra
           | 
           | So you can get all of the terminal level unix like goodness
           | of radare2, yet still get really great ghidra quality
           | decompiler output.
        
           | userbinator wrote:
           | How well does it decompile _itself_? I 've always considered
           | that a great test, much like a self-compiling compiler is a
           | notable milestone.
           | 
           | (I believe IDA has a check to stop you from doing this.
           | Cracking that was one of the "rite of passage" exercises back
           | in the day.)
        
             | lima wrote:
             | It's open source and written in Java.
        
               | kaba0 wrote:
               | And if anyone is curious, Java byte code is very easy to
               | decompile and it will come up quite close to the real
               | thing (unless obfuscated)
        
             | rjzzleep wrote:
             | Isn't it written in Java? Why would it need to do that?
             | 
             | IDA has had watermarks and all sorts of other fancy stuff.
             | The real challenge with IDA was extending the demo to allow
             | it to save databases before they started publishing a
             | working older free version.
             | 
             | I like IDA a lot more than I like all the other tools,
             | especially since I consider the user experience and hotkeys
             | far superior, but the other day I did look at something
             | where the disassembly and decompilation was great compared
             | to other tools(one of the r2+ghidra UIs). I think because
             | flirt signatures were missing and I can't get Hexrays to
             | sell me a new license.
        
               | NotSwift wrote:
               | Even better, the NSA provides the sources which you can
               | compile yourself:
               | 
               | https://github.com/NationalSecurityAgency/ghidra/releases
        
         | cies wrote:
         | > Besides, if the NSA really wants to install some software on
         | your computer, they can probably do it themselves without your
         | involvement.
         | 
         | Running Linux with very few binblobs, I expect they will not be
         | able to.
         | 
         | Running any OS published by $tax_evading_big_corp, I expect
         | they can.
        
           | imwillofficial wrote:
           | Have you seen the crazy stuff the NSA does?
        
             | cies wrote:
             | Link please? I know they collect data, and have Windows
             | backdoors.
        
               | imwillofficial wrote:
               | > Documents obtained by Der Spiegel reveal a fantastical
               | collection of surveillance tools dating back to 2007 and
               | 2008 that gave the NSA the power to collect all sorts of
               | data over long periods of time without detection. The
               | tools, ranging from back doors installed in computer
               | network firmware and software to passively powered bugs
               | installed within equipment, give the NSA a persistent
               | ability to monitor some targets with little risk of
               | detection. While the systems targeted by some of the
               | "products" listed in the documents are over five years
               | old and are likely to have been replaced in some cases,
               | the methods and technologies used by all the exploit
               | products could easily still be in use in some form in
               | ongoing NSA surveillance operations.
               | 
               | https://arstechnica.com/information-
               | technology/2013/12/insid...
               | 
               | Reading their processes is so fascinating.
        
           | kaba0 wrote:
           | Running linux* that has basically no security at all, good
           | luck! A rouge extension/bash script can install whatever
           | backdoor it wants without problem.
           | 
           | * under linux I mean mainstream distro here. Unless you use
           | qubes os, it will not have good sandbox, everything runs as
           | your user and can easily modify eg. .bashrc and start up a
           | key logger to get sudo password.
        
         | ShepherdKing wrote:
         | I would be curious to know if anyone has audited this for
         | malicious code, or how one would go about doing that in the
         | first place. Is that kind of software auditing a use case for
         | Ghidra? A demo of using Ghidra to audit Ghidra would be
         | interesting I suppose.
        
           | pkaye wrote:
           | Its used to reverse engineer an unknown binary without the
           | matching source code. Since Ghidra already is open source it
           | be no use to audit Ghidra itself except for learning
           | purposes. It might be useful to reverse engineer a closed
           | source driver so you can write an open source one from
           | scratch.
        
             | NotSwift wrote:
             | A security audit is still useful when you have sources to
             | the program. There may still be some intended or just
             | accidental security problems with it. Having the sources
             | makes such an audit a lot easier to do.
        
               | aj3 wrote:
               | It's a huge code base, of course there are security
               | issues. Same way IDA and radare have security issues.
               | People who reverse malware take that into account.
        
             | barkingcat wrote:
             | I would expect there to be self-mutating code such that
             | when the open source code is compiled with a particular
             | compiler it activates a different code path (written into
             | the compiler itself) such that the final resulting binary
             | does not correspond to the source code if it were compiled
             | with another compiler.
             | 
             | And if this resulting binary is distributed, audits of the
             | source code wouldn't catch these modifications.
        
               | Godel_unicode wrote:
               | 1) There are many java compilers with diverse origins.
               | Try more than one.
               | 
               | 2) The binary (or jar) can't lie about what it contains.
               | Take it into an air gap and reverse engineer it, what's
               | there is there. This includes compilers.
               | 
               | 3) see posters comment about the impracticality of
               | stopping someone with the money, talent, skills, and
               | patience of the NSA :)
        
           | knownjorbist wrote:
           | Reflections on Trusting Trust is worth a read.
           | 
           | https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_Ref.
           | ..
        
             | mlatu wrote:
             | Not really. TLDR: You cannot trust code you did not botch
             | up yourself.
        
               | [deleted]
        
               | knownjorbist wrote:
               | Never thought I'd see the day where someone on HN is
               | suggesting Ken Thompson isn't worth reading.
               | 
               | If you've never read it I highly encourage you to do so.
        
         | rapjr9 wrote:
         | I can think of one concern about downloading and installing it,
         | the NSA might be interested in who uses it. No need for
         | anything malicious in the code, they just watch to see who
         | downloads it.
        
           | aj3 wrote:
           | But it's hosted on Github. And some distros have ghidra in
           | official repos.
        
             | croes wrote:
             | Is Snowden already forgotten? Doesn't matter where it's
             | hosted, NSA still knows who downloaded it.
        
               | bccdee wrote:
               | Insofar as they know everything anyone downloads from
               | Github, sure.
        
               | aj3 wrote:
               | They must know who downloaded radare and IDA as well
               | then.
        
         | raxxorrax wrote:
         | I don't think there is anything fishy here, although I don't
         | think the NSA can just install anything on my computer, even if
         | I were based in the US. There is a lot of bluffing when it
         | comes to cyber security.
         | 
         | Still it might be quite a useful tool.
        
           | o8r3oFTZPE wrote:
           | "There is a lot of bluffing when it comes to cyber security."
           | 
           | I wish this topic received more discussion.
        
             | nix23 wrote:
             | Yes we can talk about that, let's start with the FSB an why
             | they are always so stupid ;) to left the compilation time
             | with the working-hours of moscow and the cyrillic keyboard
             | in the compiled binary.
        
               | imwillofficial wrote:
               | It's almost as if it's not the FSB... but somebody making
               | it look like it was... (See the Vault7 leak attribution
               | masking)
        
           | px43 wrote:
           | I guarantee that whatever browser you use, they have 0day for
           | it. Whatever ISP you use, they can inject traffic into it,
           | and they have a much easier time about it if you _aren 't_ in
           | the US.
           | 
           | If you're someone who uses the Internet, the NSA can take
           | over whatever you use to browse with and have their way with
           | it. If you don't, well that's what their interdiction program
           | is for.
           | 
           | The thing is though, the economics of 0day indicate that the
           | more you use it, the more likely it is that it'll get burnt,
           | and supply is limited.
           | 
           | They can certainly hack _anyone_ , but it doesn't scale, so
           | they can't simply hack _everyone_. They can maybe use these
           | techniques on a handful of targets per year, so they make it
           | count, but most of their intelligence comes from the data we
           | all give away for free every day.
        
             | zarzavat wrote:
             | Indeed the best protection against getting 0day'd is
             | probably to be into computer security. I feel confident
             | that the NSA is not throwing 0days at computer security
             | professionals; whereas they could use them on the average
             | person with little risk of detection.
        
           | nix23 wrote:
           | >although I don't think the NSA can just install anything on
           | my computer
           | 
           | If it's not connected to a network you are probably
           | right....otherwise 100% wrong, if your a enough valuable
           | target. And just lets say for fun your OS is 100%
           | bulletproof, your +30 firmware's are not.
        
             | nextlevelwizard wrote:
             | What's with the doomer mentality. NSA isn't some magical
             | unicorn that can just walk through everything
        
               | ARandomerDude wrote:
               | They kind of are though. If you have a _LOT_ of money,
               | time, and personnel -- and they do -- you can find a lot
               | of vulnerabilities.
        
               | nextlevelwizard wrote:
               | Yes and we've seen their shit get leaked over the years.
               | From that we can see clear patterns in what they view as
               | valuable and where they spend their significant, but
               | still limited focus.
        
               | nix23 wrote:
               | Can you proof that it is a leak, and not a stunt by the
               | NSA itself?
        
               | nextlevelwizard wrote:
               | You have be wearing multiple tinfoil hats if you think
               | NSA released DeepBlue as some sort of black flag OP
        
               | nix23 wrote:
               | >NSA released DeepBlue as some sort of black flag OP
               | 
               | EternalBlue...and it was a part of the shadow broker
               | package, but that was just one occasion, Snowden is one
               | of the other.
               | 
               | One must probably wear a Tar-hat to think that this is
               | impossible.
        
               | nextlevelwizard wrote:
               | I guess we just have to agree to disagree. There was no
               | benefit for them releasing the zero day.
        
               | nix23 wrote:
               | >NSA isn't some magical unicorn
               | 
               | With unlimited money and the given job to crack
               | encryption, hack into systems and secure the networks of
               | the wealthiest nation and only superpower on earth atm.
               | It IS pretty much a unicorn, and i am pretty sure they
               | are +20 years in the future technology-wise, and with
               | that:
               | 
               | >>Arthur C. Clarke -- 'Magic's just science that we don't
               | understand yet.'
               | 
               | So yes Magic Unicorn describes the NSA pretty well.
        
               | aj3 wrote:
               | Yeah, that's bullshit. For NSA-proof personal tech stack
               | you'd rely more on tamper-evident blocks that's all.
               | Also, security in depth and security through obscurity
               | are much more applicable if you're a person and not an
               | organization. Finally, +20 years head start does not mean
               | much if you distrohop and FOMO into bleeding edge stuff
               | like a tech podcaster.
        
               | nix23 wrote:
               | Not sure if you know what your talking about, you sound a
               | bit like a bot #NSA-proof #distrohop
        
               | aj3 wrote:
               | In case you're genuinely curious, 'NSA-proof' is a
               | portmanteau from NSA and 'idiot-proof'. Distrohopping is
               | when people change (usually GNU/Linux) distributions once
               | a month or so (which is an allusion at tongue-in-cheek
               | conjecture that one can change distributions faster than
               | NSA can break them). Have a good day, fellow human.
        
               | nix23 wrote:
               | >one can change distributions faster than NSA can break
               | them
               | 
               | Oh man i don't know what to say. Does one distrohop the
               | ssd/efi/net/wireless/keyboard/etc-firmware too?
               | 
               | One distrohoped for 15 years and that vuln existed all
               | the time..but hey it would be just that one...it's an
               | exception right? ;)
               | 
               | https://securityaffairs.co/wordpress/115565/security/linu
               | x-k...
               | 
               | How many completely different browsers exist? And how
               | many local exploitable user to root exploits exist in the
               | Apple/Linux/BSD world's? If your a valued target and you
               | are connected to a network you WILL be hacked.
        
               | aj3 wrote:
               | Buddy, I'm not gonna follow this thread anymore because
               | you seem to be baiting me to read you a lecture on OPSEC,
               | security in depth and compartmentalization.
        
               | imwillofficial wrote:
               | Buddy, your distro hopping advice is advice so bad, that
               | the most charitable interpretation is you have no idea
               | what you're talking about.
               | 
               | Seriously? Distro hop? My brain hurts, I need coffee.
        
               | leucineleprec0n wrote:
               | Lol, this is so fucking funny. Distro a day, NSA stays
               | away! Amazing.
        
               | imwillofficial wrote:
               | Yeah this is bullshit. There is no demonstrated NSA proof
               | setup. If they haven't broken in to something, they
               | aren't telling us about it.
        
               | aj3 wrote:
               | Assuming that time travel is impossible, NSA can't break
               | into something that does not exist anymore. Hence the
               | idea when facing such adversary is to provide them a
               | constantly moving target. Although NSA might be able to
               | break any full disc encryption given enough time, they
               | aren't able to decrypt something that no longer exists.
               | 
               | This principle isn't scalable to every computer system
               | out there and will definitely go against other
               | requirements in most organizations, but if you are an
               | individual, it's not hard to pull it off.
        
               | imwillofficial wrote:
               | This ignores the obvious. What parts are not changing
               | with a distro hop?
               | 
               | Are those parts vulnerable to the NSA?
               | 
               | I believe due to what was made public, that they do have
               | that capability.
               | 
               | I would suggest more research. If you are actually
               | changing distros every month, that seems like a very
               | manual process, with many points to use an insecure
               | config. I think your time could be better spent hardening
               | a current system.
               | 
               | And yes the NSA could own your box every month (and
               | would) if it suited them.
               | 
               | Check out this link, this stuff is fascinating.
               | 
               | > In some cases, the NSA has modified the firmware of
               | computers and network hardware--including systems shipped
               | by Cisco, Dell, Hewlett-Packard, Huawei, and Juniper
               | Networks--to give its operators both eyes and ears inside
               | the offices the agency has targeted. In others, the NSA
               | has crafted custom BIOS exploits that can survive even
               | the reinstallation of operating systems. And in still
               | others, the NSA has built and deployed its own USB cables
               | at target locations--complete with spy hardware and radio
               | transceiver packed inside.
               | 
               | https://arstechnica.com/information-
               | technology/2013/12/insid...
        
               | aj3 wrote:
               | You pose the questions but do not answer them. Assuming
               | distros are selected purposefully you do get quite a lot
               | of variability. Recompiling the kernel with different
               | hardening options alone makes many exploits impractical.
               | 
               | The threat modeling that you see in this thread is
               | laughable. Nobody has infinite resources, not even NSA.
               | They can't throw all their capability at you alone. In
               | fact they are not even interested in any one individual.
               | They might be interested in some groups of people like
               | "terrorist leadership" but even in that case they don't
               | have the need to hack all people matching that group. So
               | at every step of the decision making process there is a
               | cost benefit analysis. And in the end NSA will only hack
               | some terrorist leaders, the ones deemed sufficiently
               | significant but not any more risky then is necessary.
               | 
               | The amount of meetings and paperwork required for
               | carrying out offensive action is significant and everyone
               | involved is very risk averse. Getting superiors to sign
               | up for an operation against an individual capable of
               | detecting attack and thus risking attribution would only
               | be possible if the proposed techniques can be shown to be
               | extraordinarily stealthy. That requires replicating the
               | system in the lab and rigorously testing methodology
               | beforehand.
               | 
               | Yeah, it is hard to protect organizations from nation
               | states. Because all sufficiently complex systems have
               | bugs and given long enough time persistent attackers will
               | find & exploit these bugs. But that's because
               | organizations have other real-world priorities besides
               | fighting NSA. These organizations can't change protocols
               | overnight and replace core systems just for fun of it.
               | 
               | Individuals actually have an advantage here because they
               | can rotate systems at will and have much higher control
               | over their personal lives than any CEO/CTO/CISO has over
               | their organization. As a result, yes you can raise the
               | cost of an attack against you high enough that NSA won't
               | bother hacking you - either because there are other
               | people who are less protected but hacking them would
               | fulfill the same objective or because your ass gets
               | handed to another agency which is able to present more
               | cost-effective solution.
               | 
               | Your link demonstrates this dichotomy between options
               | that NSA has available for hacking organizations vs
               | individuals. Individuals rarely have well documented
               | procurement processes available for third party auditing
               | you know.
        
               | imwillofficial wrote:
               | > You pose the questions but do not answer them.
               | 
               | I literally answer directly after the questions. Read for
               | comprehension.
               | 
               | I can tell you with 100% certainty that your assumptions
               | are 100% wrong. Interpret that statement as you may and
               | update your threat model accordingly.
        
               | nix23 wrote:
               | You sir have no clue what you talking about, a payload
               | geter in your ssd-firmware survives your distro-hop and
               | can adapt to every OS (if your information is worth the
               | work). And an encrypted disk...on man i stop arguing,
               | it's obvious that you really don't have a clue.
        
               | aj3 wrote:
               | You just keep talking straight past my points without
               | even trying to understand them. Why bother writing
               | answers at all?
               | 
               | I'm not advocating for installing a fresh OS on an
               | exploited hardware and calling it a day, no matter how
               | hard you try to present my words this way.
               | 
               | The point is to keep any single environment around only
               | for a short period of time so that adversaries don't have
               | enough time for replicating your systems and crafting a
               | targeted exploit chain.
               | 
               | It is not meant to be the only line of defense. You would
               | still harden every system you own, putting particular
               | focus on tamper & intrusion detection (including
               | retrospective analysis).
               | 
               | Couple that with strong compartmentalization (e.g. using
               | different hardware for different purposes, Qubes OS style
               | virtualization approaches) and defense in depth (exploit
               | mitigations, traffic anonymization).
               | 
               | Here, I have spelled it out for you. Feel free to outline
               | how you would approach attacking such individual
               | adversary, even with NSA level team at your disposal.
               | Silent assumptions being that 1) if person's physical
               | location is known, CIA is a cheaper option than NSA and
               | 2) failed offensive operation leaving attributable
               | evidence is considered by NSA worse than missed
               | opportunity.
               | 
               | Please, stop low effort ad hominem attacks.
        
               | imwillofficial wrote:
               | > adversaries don't have enough time for replicating your
               | systems and crafting a targeted exploit chain. Is this
               | how you think it works?
        
               | nix23 wrote:
               | Wow you change your meaning pretty fast, yes if you trow
               | your laptop away after 1 hour you are pretty safe...well
               | if the laptop is from a secure source...like amazon ;)
        
             | raxxorrax wrote:
             | I doubt it. From operations that went public the attack
             | vectors are known and you can extrapolate something about
             | their capabilities.
             | 
             | Of course they could get access if I were a valuable
             | target, but that might just as well be with a large wrench.
             | But they cannot just take control of any device.
             | 
             | And I think many companies might even have better
             | capabilities. Or defense, since intelligence work is very
             | often about industrial espionage.
        
               | NotSwift wrote:
               | The NSA is an agency with a yearly budget of
               | approximately 10 billion dollars. There are not many
               | companies that can match that.
        
               | killjoywashere wrote:
               | You don't even exist to them. The NSA wants to infiltrate
               | nations. They do stuff like hire a friendly foreign
               | nation to quietly _buy a security company their target
               | depends on_ and then exploit that vulnerability from a
               | host in a fourth nation.
        
               | nix23 wrote:
               | >From operations that went public
               | 
               | Are you talking about Snowden's powerpoint slides or the
               | Shadow Brokers arsenal?
        
               | atatatat wrote:
               | Wisen up.
        
           | dhx wrote:
           | I think a lot of people underestimate how hard it would be to
           | build something like Ghidra not from a technical perspective,
           | but from an avoiding big organisation bureaucracy
           | perspective. Unlike a typical bureaucracy however, and
           | amongst other problems[1], the barrier for entry for hiring
           | is extremely high, everything happens within an echo chamber
           | (closed community with little external influence) and
           | paranoia and overbearing security process has a freezing
           | effect on morale and the use of modern workplace practices
           | and technology.
           | 
           | Whilst other companies and organisations hire staff quickly
           | who can more freely experiment with the latest technology
           | from a hip coffee shop or their home, someone at an
           | organisation like the NSA after waiting a year to start the
           | job and after having hiked 8km from their car to a windowless
           | and soulless building in the middle of nowhere instead has to
           | fill out dozens of forms and seek dozens of approvals just to
           | consider the idea of experimenting with some new technology.
           | 
           | I am amazed something as useful as Ghidra could actually be
           | built within such a large bureaucracy in modern times, and
           | then even more amazed that someone managed to get it released
           | as open source software to ensure it continues to be
           | maintained and useful long after the next internal
           | reorganisation and exodus of developers.
           | 
           | [1] https://news.ycombinator.com/item?id=16057449
        
             | [deleted]
        
           | NotSwift wrote:
           | There has been a lot of cyber crime in recent years, e.g. see
           | the recent wave of ransomware attacks. These criminals are
           | mostly amateurs that know some exploits and use them. The NSA
           | is a huge organization that employs many professional
           | experts. Spying is one of their main objectives so you can be
           | pretty certain that they are pretty good at it. Computer
           | systems contain a lot of vulnerabilities and you can be
           | pretty certain that they know a lot of them.
           | 
           | The computers of most people are vulnerable even to normal
           | cyber criminals, the NSA is a lot more powerful.
        
             | inlikealamb wrote:
             | Most of their work probably doesn't even need to be
             | technical. How many high-profile attacks have been based on
             | social engineering?
        
               | killjoywashere wrote:
               | Most people hear "social engineering" and think of
               | someone playing journalist to get access to places. The
               | NSA's idea of social engineering is having the CIA work
               | with the BND to buy Crypto AG.
        
               | inlikealamb wrote:
               | how many "former" government employees work at Google?
        
               | NotSwift wrote:
               | Social engineering can be highly effective. However, from
               | what we know about the NSA, especially from the Snowden
               | leaks, it appears to be mainly a technical agency. It
               | seems likely that the NSA does not use social engineering
               | on a large scale itself but hands it off to other
               | agencies like the CIA or the FBI.
        
           | ragona wrote:
           | I'm quite sure they could, but mostly just because they could
           | simply walk into your house and tamper with the hardware. You
           | don't need a fancy zero day when you're the government.
        
             | klyrs wrote:
             | Funny thing about lockdown/wfh4l... they're really gonna
             | wait a while to get in
        
               | rytis wrote:
               | Turn up with a bunch of fire engines, and a gas company
               | van. Knock on your door, and 3-4 neighbors on each side,
               | for good measure. Tell there's been a report of a gas
               | leak, and you need everyone to leave their
               | houses/apartments immediately for the inspection. 15-20
               | mins later - you can come back in, all's safe. Thank you
               | for your cooperation.
        
           | user3939382 wrote:
           | If they could install a virus on Iran's air-gapped uranium
           | centrifuge industrial control systems, I'm pretty sure they
           | could get one on your computer.
        
             | nextlevelwizard wrote:
             | Bribing people in generally corrupt and poor countries to
             | smuggle a USB stick is kind a different than just breaking
             | into random persons home in a country with relatively low
             | corruption. Latter might actually be more difficult.
             | Obviously depends on what your end goal is
        
               | arthurcolle wrote:
               | Passing an infected USB stick to operators in poorer
               | countries (as you say) is hardly the most impressive part
               | of the deployment procedure.
        
               | nextlevelwizard wrote:
               | but literally the most important when you need to attack
               | air gapped machine
        
               | arthurcolle wrote:
               | No, it's not the most important.
               | 
               | The most important was clearly obtaining the PLC zero
               | days to infect the physical machines. It's unclear to me
               | why you choose to be so explicitly obtuse but in any
               | case, for your own personal edification, feel free to
               | read some details on how it went down -
               | 
               | [0] https://www.wikiwand.com/en/Stuxnet
               | 
               | [1] https://www.wired.com/2014/11/countdown-to-zero-day-
               | stuxnet/
               | 
               | [1] https://www.hsdl.org/?view&did=792239
        
               | nix23 wrote:
               | Sorry but Hum-int/ops is still the most important
               | factor...especially with systems who has an air-gap.
        
               | nextlevelwizard wrote:
               | Zero day is worth nothing if you don't have someone to
               | plug it in, but sure, be pissy about it.
        
               | NotSwift wrote:
               | This was a complicated operation that had many difficult
               | steps. If any of these steps would not have worked, the
               | entire project would have failed. Just pointing at one of
               | these step as the most important does not show much
               | appreciation of the other steps.
        
               | user3939382 wrote:
               | That was the strategy for that situation. They can use
               | national security letters and gag orders to force
               | multinationals to silently turn over root certificates,
               | they can intercept hardware you buy in the mail, they can
               | MITM your connection with the full cooperation of your
               | ISP. Anyone who thinks they're going to defend themselves
               | against a targeted attack by the most sophisticated and
               | well funded state-level attacker in the world is
               | dreaming.
        
               | imwillofficial wrote:
               | There is no evidence that the victims were bribed in that
               | attack
        
               | IncRnd wrote:
               | It's best not to assume a physical presence is required.
               | Who is to say that the people at Let's Encrypt, NoScript,
               | any of the firmwares' authors, or many other places
               | weren't compromised years ago? It's sometimes worthwhile
               | to reflect on where trust is placed.
        
               | nextlevelwizard wrote:
               | It would be hell of a trick to inflitrate air gapped
               | machine without physical presence.
        
               | IncRnd wrote:
               | We were talking about the NSA getting an exploit onto an
               | individual's computer, not an air gapped machine.
        
               | atonse wrote:
               | I don't know. Seeing how extensively these key signing
               | ceremonies (Let's Encrypt included) are designed against
               | tampering and collusion, I'd be shocked and impressed if
               | they were infiltrated.
               | 
               | We've found instead that the NSA can just take over your
               | unpatched computer easily instead of putting in the
               | effort of hacking Let's Encrypt.
        
               | IncRnd wrote:
               | Unfortunately, a child can take over an unpatched
               | computer using public exploits.
               | 
               | Please explain your comment about how key signing
               | ceremonies stop people from being bribed. The creation of
               | those keys creates a root of trust but doesn't stop leaf
               | certs from being generated.
        
             | aj3 wrote:
             | Actually hacking systems is easier than (some) individuals.
             | It's pretty obvious if you think about it. ICS are operated
             | by group of people, they have well defined accessibility
             | and availability requirements, some sort of documentation
             | exists, internal processes have large inertia.
             | 
             | On the other hand individual security professionals might
             | have wildly different ideas about risk tolerance and
             | convenience, which they also have privilege to change on
             | the whim.
        
             | TylerLives wrote:
             | I doubt it. I have the latest version of Arch Linux.
        
         | pelasaco wrote:
         | probably makes sense. I see in the government level a lot of
         | open positions for reverse engineers.. having its own tool,
         | helps, at least, to save money in licensing (assuming they are
         | using or planning to use Ghidra to do that)
        
         | ozfive wrote:
         | These are all true statements. Greetings from Seattle,
         | Washington, USA! No need to cc them on this post. No one should
         | kid themselves with what NSA is working on. No one should also
         | kid themselves with what they aren't capable of.
        
       | dominicjj wrote:
       | Ghidra is a very cool utility. I used it to disassemble
       | StarGlider for DOS - a very old fav - to figure out how the game
       | worked. Together with the DosBox debugger I managed to create my
       | own hack so I could play the game without being killed the whole
       | time.
        
       | xvilka wrote:
       | If you want to harness the power of Ghidra decompiler but without
       | the need of installing Java - Rizin[1][2] and Cutter[3][4]
       | (Rizin's Qt GUI) integrate Ghidra's decompiler part that is
       | written in C++ (libdecomp) as plugin - rz-ghidra[5]. We work
       | currently on improving the integration and the quality of output.
       | 
       | [1] https://rizin.re
       | 
       | [2] https://github.com/rizinorg/rizin
       | 
       | [3] https://cutter.re
       | 
       | [4] https://github.com/rizinorg/cutter
       | 
       | [5] https://github.com/rizinorg/rz-ghidra
        
         | vesche wrote:
         | For anyone confused (as I was) rizin is a fork of radare2. I
         | don't have anything constructive to say other than I'm confused
         | why the project was forked.
        
           | xvilka wrote:
           | The reasons behind the fork are described in our FAQ[1].
           | TLDR: we removed everything irrelevant, not working, rewrote
           | some pieces completely, focus on maintainability, cleaner
           | code, easier onboarding of new contributors, better code
           | documentation (Doxygen), better API and testing.
           | 
           | [1] https://rizin.re/posts/faq/
        
             | orra wrote:
             | Creating a welcoming, and not a hostile, environment was on
             | its own a good enough reason to fork.
             | 
             | But also. Cutter is the first time that either Rizin or
             | Radare has been simple enough for me, an entry level RE
             | enthusiast, to use. So thanks.
        
         | ktpsns wrote:
         | These two tools have so much better websites as Ghidra. Thanks
         | for putting the links!
        
       | robthebrew wrote:
       | I'm not sure why this is news. It is an amazing bit of kit, and
       | cross platform. I've been using g it for many months now and
       | highly recommend it.
        
         | beefcafe wrote:
         | Probably because a new version was just released. Details here*
         | but big news is debugger support. Looking forward to taking it
         | for a spin.
         | 
         | https://htmlpreview.github.io/?https://github.com/NationalSe...
        
           | e12e wrote:
           | These are great release notes - I think quite a few Foss
           | projects could draw some inspiration here.
        
         | NotSwift wrote:
         | For you it is obviously not news, but for other people it
         | probably is. For me, HN is about learning something new, not
         | just for learning about something that happened in the last 24
         | hours.
        
           | TaylorAlexander wrote:
           | I once was a total jerk on a mailing list (okay in my youth I
           | was a jerk many times on mailing lists).
           | 
           | Someone shared an article I had seen earlier that year. "Why
           | would you share this? This is old news it's already made the
           | rounds on the web." Like I expected everyone to have the same
           | experience as me. Luckily someone told me to chill out or I'd
           | be blocked, that the list was for any news people found
           | interesting. I felt very embarrassed and didn't post there
           | again for a long time, but it was my own fault.
        
           | prophesi wrote:
           | Potentially news to those who recently got into
           | coding/hacking. Ghidra was leaked in '17 and made headline
           | news. Then officially released by the NSA in '19.
        
             | mkishi wrote:
             | Because you know everything that made the headlines up to
             | 2017?
             | 
             | There might or might not be discussion potential on any
             | submission, so I understand arguing about their value, but
             | that "news if you're a beginner" was very condescending.
             | Why not be happy about today's lucky 10,000?
        
               | prophesi wrote:
               | > Because you know everything that made the headlines up
               | to 2017?
               | 
               | No, and I didn't mean to sound condescending. I'll take
               | out the "only" in my message.
               | 
               | Edit: And to clarify what I meant, I may not have known
               | every headline in 2017, but I sure as hell heard about
               | most of the Vault 7 releases. An organization anonymously
               | releasing a world power's cyber tooling is something out
               | of a cyberpunk novel.
        
           | pvg wrote:
           | There's a plenty of Ghidra content on HN on a regular basis,
           | take a look at
           | 
           | https://hn.algolia.com/?dateRange=all&page=0&prefix=true&que.
           | ..
        
         | dqv wrote:
         | I did a double take seeing Ghidra in a headline because just
         | yesterday I was watching a video of someone going through
         | WannaCry with Ghidra. I had never heard of it before yesterday.
         | https://www.youtube.com/watch?v=Sv8yu12y5zM
        
       | TheBrokenRail wrote:
       | I haven't used Ghidra that extensively, but it worked well when I
       | was using it to assist in modding Minecraft Pi. The big point in
       | its favor for me is that its free and supports ARM32, while IDA's
       | free version only supports x86.
        
       | motohagiography wrote:
       | I used this again just the other day with the cantor.dust plugin.
       | My rev.eng skills are dull and were never great to begin with,
       | but for anything below a real APT with obfuscation, runtime
       | decoding and unpacking, Ghidra is an equalizer. Between this and
       | Chef from gchq, someone with devops skills can probably skill up
       | to an entry level threat analyst level in a few weeks or months.
       | The tooling available today is really good.
       | 
       | If people are worried about running systems backdoored by NSA,
       | they probably shouldn't use things like electricity either. It's
       | a threat actor you can't really do anything about.
        
         | technics256 wrote:
         | I work in devops and would like to know more. Do you know any
         | good resources for learning or starting out?
        
         | ackbar03 wrote:
         | You mean my electricity has been backdoored? Now that's
         | paranoia on a different level, how does that work
        
           | motohagiography wrote:
           | It was a wry comment about emanations security and TEMPEST
           | (https://en.wikipedia.org/wiki/Tempest_%28codename%29), which
           | people think about mainly for CRTs, with the implication I
           | have no doubt there exist methods for remote differential
           | power analysis of crypto operations as well.
           | 
           | Helpfully in the mean time, someone has written a wiki page
           | about some stuff we used to add to threat models:
           | https://en.wikipedia.org/wiki/Radiofrequency_MASINT
           | 
           | Just because you're paranoid doesn't mean they aren't
           | actually using RF side channels to steal your keys and
           | passphrases.
        
           | X6S1x6Okd1st wrote:
           | If your threat model is so big to include surviving an attack
           | by the NSA your threat model is probably wide enough to
           | survive the grid going down
        
           | shadilay wrote:
           | Powerline ethernet?
        
             | Datagenerator wrote:
             | Some people like me, can hear data movement on PCB's. The
             | electrical circuit has noise signatures which change if
             | other data is injected by Ethernet over powerline
             | equipment. The distance from which this works is quite
             | large, up to a few houses with consumer hardware. Fear
             | equipment with built-in LoFi.. that's reachable without
             | cooperation of LAN equipment..
        
               | rytis wrote:
               | > The electrical circuit has noise signatures which
               | change if other data is injected by Ethernet over
               | powerline equipment.
               | 
               | What does this even mean?
        
               | rembicilious wrote:
               | When you say you can "hear data movement on PCBs", do you
               | mean you have some kind of superhuman ability, or that
               | you know how to use some combination of instrumentation
               | and analysis to "hear" the data?
        
               | kragen wrote:
               | Depending on the particular PCB designs, there may be
               | piezoelectric capacitors and magnetostrictive inductors
               | that produce noises that ordinary, non-super, humans can
               | easily hear. Of course the spectrum of these vibrations
               | extends up into the GHz, but it generally also extends
               | down to near DC, until the physical size of the
               | components is too small to efficiently couple the
               | vibrations into the air. (And PCBs, in particular, lower
               | that high-pass frequency a lot, by providing a large,
               | fairly rigid area that's soldered to a lot of surface-
               | mount components.)
               | 
               | Typically DC-DC converters are the easiest thing to hear,
               | because of the sheer amount of energy involved. Normally
               | these are operated at PWM (pulse) frequencies well
               | outside hearing range--40-300 kHz--but often enough the
               | feedback scheme for controlling those pulses oscillates
               | in a way that generates audible subharmonics whose
               | _frequency_ depends on the power draw at any given
               | moment. Modern computers are _full_ of DC-DC converters.
               | 
               | Also, though, it's common for computers to contain
               | sensitive low-noise audio-frequency amplifiers connected
               | to a periodic sample-and-hold circuit which can alias
               | high frequencies down into the audio range, with the
               | output hooked up to loudspeakers; these are called "sound
               | cards" and it's not at all unusual for them to produce
               | clearly audible sounds that depend on the computation
               | happening, at least if you turn the volume up all the
               | way.
               | 
               | Finally, regular, non-super, humans can directly perceive
               | radio frequency emissions as sounds: "The human auditory
               | response to pulses of radiofrequency (RF) energy,
               | commonly called RF hearing, is a well established
               | phenomenon. RF induced sounds can be characterized as low
               | intensity sounds because, in general, a quiet environment
               | is required for the auditory response... Effective
               | radiofrequencies range from 2.4 to 10000 MHz."
               | https://pubmed.ncbi.nlm.nih.gov/14628312/
               | 
               | So "hearing data movement" because of "noise signatures
               | that change" is not at all unusual. You can probably do
               | it yourself if you have a quiet room to listen in. It's
               | _plausible_ that Ethernet-over-powerline equipment could
               | produce audible sounds from the power supplies in the
               | same house or nearby houses, but I haven 't observed that
               | myself and this is the first time I've heard of that
               | happening.
        
               | shadilay wrote:
               | I assumed he was talking about the noise inductors and
               | transformers make. Like how you can hear the power
               | transformers on telephone poles.
        
           | willis936 wrote:
           | I think their point is that it's either so futile to attempt,
           | or so unlikely an issue, that the NSA targets US civilians
           | that living off the grid is lower hanging fruit from an
           | absolutist opsec perspective.
        
         | homarp wrote:
         | Chef from gchq refers to https://github.com/gchq/CyberChef
        
       | lnyng wrote:
       | This strange looking name remind me of Ghoti:
       | https://en.m.wikipedia.org/wiki/Ghoti
        
         | asddubs wrote:
         | it's named after the three headed beast
         | 
         | https://en.wikipedia.org/wiki/King_Ghidorah
        
           | bobsil1 wrote:
           | Six Eyes Alliance
        
       | bovermyer wrote:
       | I love that they named it Ghidra and use a dragon for a logo.
       | That endears me to the people who built it.
        
       | anonymousiam wrote:
       | First heard about this in closed channels and tried really hard
       | to get a copy, but failed.
       | 
       | Was pleased to discover a few years later that they had open
       | sourced it.
       | 
       | They're up to v10 now and it's so much better than IDA
       | Pro/HexRays that it's probably going to put them out of business.
        
       | rejectedandsad wrote:
       | Few years in with debugger support, how does Ghidra compare to
       | IDA?
        
         | chc4 wrote:
         | I like Ghidra more than IDA. Having "proper" type support is
         | nice - IDA's struct and type annotation support always felt
         | very hacked together and hard to use. Ghidra's typing and
         | decompiler is good enough that I don't even have to look at the
         | disassembly listing for most functions, and struct
         | autogenerating is wonderful.
         | 
         | Unfortunately, Ghidra handles vtables and OOP very poorly
         | still. You have to do a lot of by-hand annotations for virtual
         | calls, even with 3rd party analysis scripts, while IDA's C++
         | usually Just Works. This is the main pain point, imo. The other
         | main thing is that IDA has been used by the reverse engineering
         | community for _so long_ that there 's a massive body of
         | tutorials and StackOverflow answers for it, and a much larger
         | corpus of 3rd party plugins. It's not a big deal for me,
         | personally, but if you already have a good workflow for IDA
         | it's probably not worth it to switch. For beginners I'd
         | recommend Ghidra instead, though, because a free and open
         | source tool with good official documentation and UX is worth
         | its weight in gold (although I've heard BinaryNinja is
         | extremely good nowadays).
        
         | bri3d wrote:
         | Ghidra:
         | 
         | * Affordable for sane people (aka, free)... This of course
         | pushed Hex-Rays to finally make a cheaper version of IDA, but
         | it's massively hobbled and useless for uncommon architectures.
         | 
         | * Almost as good architecture coverage. Missing a few big ones
         | for automotive RE still - SuperH is still hit and miss, and no
         | real C167. But the user-contributed Tricore is really quite
         | impressive.
         | 
         | * Decompiler works across all architectures.
         | 
         | * Debugger is still sketchy, but has progressed extremely
         | quickly.
         | 
         | * Preferable UI (IMO), and better struct handling.
         | 
         | * Decent plugin interfaces but fewer available plugins.
         | 
         | IDA:
         | 
         | * Still slightly better decompilation and disassembly for
         | x86-64. Doesn't get as "lost" in vtables and big switches.
         | 
         | * Much better C++ construct support.
         | 
         | * More plugins and scripts available off the shelf.
         | 
         | * Still a few architectures which Ghidra doesn't have yet.
         | 
         | * Debugger is more stable and works a bit better.
         | 
         | For most architectures I would not start using IDA today as a
         | hobbyist, but if I had a good IDA workflow or was joining a
         | company where it were the gold standard, I wouldn't feel
         | compelled to move over.
        
       | comandillos wrote:
       | I used Ghidra for the first time to hack my robot vacuum.
       | 
       | Some months later I used it to reverse engineer the on-board
       | software of a satellite running on a SPARCv8 CPU. It worked great
       | in both cases, can recommend.
        
       | gnunez wrote:
       | Ghidra was released 2 years ago. Am I missing something?
        
         | asddubs wrote:
         | version 10 recently came out, now featuring a debugger
        
       | justshowpost wrote:
       | I'm curious about diffs between Ghidra_PUBLIC and Ghidra_LEAKED,
       | that's all.
        
       ___________________________________________________________________
       (page generated 2021-07-14 23:02 UTC)