Questions tagged [ghidra]

Ghidra is a software reverse engineering (SRE) suite of tools developed by NSA and released as Open Source (Apache License 2.0) in 2019.

116 questions
1
vote
0 answers

Need Ghidra to Auto Analyze common Microsoft C Functions

Fellow Reverse Engineerers, I've been using Ghidra for quite some time now and I began realizing that there are certain functions, like rand and wcscpy, that Ghidra just will not auto analyze and will not auto populate (see attached picture). How…
Stryker2k2
  • 108
  • 9
1
vote
1 answer

How to add an Enum with python into a Ghidra project

Saw someone using ghidra.app.util.cparser.C to parse a string of a struct into a struct object and than they added it into Ghidra using data_type_manager.addDataType(). I want to implement that method with Enumerates but I'm not sure how. If there…
Rex
  • 53
  • 7
1
vote
1 answer

Assembly PUSH instruction with an OFFSET tag

I've written a simple 'Hello World' program in assembly: global _main extern _printf section .text _main: push offset message call _printf add esp, 4 ret section .data message db 'Hello, World2', 10, 0 I've opened the…
Daros911
  • 435
  • 5
  • 14
1
vote
0 answers

Windows Sandbox dependency

I am trying to run Ghidra(malware analysis software) inside Windows Sandbox. I brought Ghidra over to the Sandbox environment by creating a shared directory between the Sandbox and the host using .wsb file. When I try to run Ghidra inside the…
luke.lcim
  • 91
  • 1
  • 7
1
vote
0 answers

Why ghidra skip some some address

I have an so. Load in ghidra and set the base address to 0. I found that some address has skipped like this: And the so is: https://www.dropbox.com/s/wmea0pcirzopoll/libxxx.so?dl=0
user3875388
  • 541
  • 1
  • 6
  • 19
1
vote
0 answers

Offset Calculation is incorrect based on VirutalAddress Property in PE Section Header

I have created a simple .exe file with flat assembler which is actually doing nothing but just having one instruction format pe64 use64 section '.text' code executable readable mov eax, 20 After created i opened the executable in Ghidra which…
user7145038
1
vote
1 answer

Meaning of Stack[0x4]:1

So I have encounter something strange that I don't understand. I am reading theory about assembly, and I would like to know what does this Stack[0x4]:1 do. undefined AL:1 XREF[2]: …
aurora
  • 60
  • 1
  • 10
1
vote
2 answers

Ghidra : unable to find PDB and Couldn't find type info structure

I downloaded Ghidra about a week ago(I am new to reverse engineering), I did what the tutorial video from Ghidra official site was showing, I made a simple C++ program to Visual Studio, the program has an infinity while(while(1)) that prints "Hello…
platinoob_
  • 151
  • 1
  • 11
1
vote
0 answers

Visual C++ 6.0 WholeArchive

I'm reverse engineering an old computer program compiled using Microsoft Visual C++ 6.0. I'd like to let Ghidra recognize all the functions from the CRT library which is statically linked. I've tried compiling a simple program that uses fopen and…
Ahoj Lidi
  • 11
  • 1
1
vote
1 answer

What is the addr instruction after the reverse

I use ghidra armv7 reverse firmware. Analyzing to address 0x0002843a looks like r0 loads the data of address 0x0002881c but address 0x0002881c addr looks like an instruction. I read the ARM®v7-M ArchitectureReference Manual and do not see the addr…
henry80602
  • 11
  • 1
1
vote
1 answer

Get informations from decompiled ASM

I am willing to modify camera coordinate on a little 3D game. I have been able to find three functions, one for each axes. Let's call them CameraX, CameraY and CameraZ. I have been working only with the first one, when I found out that I was missing…
Nox
  • 713
  • 7
  • 16
1
vote
1 answer

ghidra: how to get static variables using ghidra python api?

I have a following c code (from a benchmark): int main(int argc, char *argv[]) { static char buf[10] = ""; /* OK */ buf[9] = 'A'; return 0; } I am using ghidra api to get some information out of the binary (precompiled using flag…
R4444
  • 2,016
  • 2
  • 19
  • 30
1
vote
0 answers

How to set HeadlessContinuationOption in Ghidra Python preScript

I'm running a Ghidra python script in headless mode from the commandline specifying my script as a preScript. e.g. ./analyzeHeadless project_path project_name -preScript pre.py -import my_exec_file I would like so set the HeadlessContinuationOption…
Eran
  • 2,324
  • 3
  • 22
  • 27
0
votes
0 answers

Ghidra Python script to print codeunits with symbols

I'm using Ghidra to disassemble and study a 68000 binary. I want to write a Python script to get a pretty print version of the disassembly (Save as menu won't be sufficient here). I thought about simply iterating through codeunits, printing labels…
T. Tournesol
  • 310
  • 2
  • 14
0
votes
0 answers

How to change the namespace of a function label from something other than Global?

When I hit "L" at an address at the start of a function I can enter a name in field "Enter Name:" There's also a "Namespace" dropdown, but the only value in this dropdown is "Global" and there seems to be no way to enter a new namespace name. How…
Dae Glyth
  • 29
  • 4