018 - Ghidra - a podcast by Jen Costillo and Alvaro Prieto
from 2019-03-15T13:33:50
Thomas Daede joined us after the Mountain View Reverse Engineering Meetup to talk about Ghidra. Ghidra is the NSA’s newly-released-to-the-public software reverse engineering tool.
The source has not yet been released, but there’s a Ghidra Github placeholder.
Some of the other things we talked about:
- Application Binary Interfaces
- Dissasemblers
- The Sharp X68000 computer
- IDA
- radare
- Virt-manager
- objdump
Thomas also mentioned @marcan42’s example of comparing his own PowerPC code with Ghidra’s decompiled output.
CrowdSupply’s Teardown conference is coming up in Portland, June 21-23.
BlackHoodie will be back in the SF Bay Area in April.
Women in Security and Privacy (@wisporg) has a scholarship program for DEFCON. You can apply for the scholarship online. They’ll cover the DEFCON ticket as well as a $500 stipend for travel/accommodation. If you want to help, you can donate here. Thanks to @RachelTobac for spreading the word! As of this episode, there are 58 scholarships available!
Jen mentioned @pinkflawd’s tweet about ELF binaries.
Have comments or suggestions for us? Find us on twitter @unnamed_show, or email us at show@unnamedre.com.
Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)
Further episodes of Unnamed Reverse Engineering Podcast
Further podcasts by Jen Costillo and Alvaro Prieto
Website of Jen Costillo and Alvaro Prieto