http://www.jetbrains.com/decompiler/
  • Do people obfuscate by handwriting assembly or are there obfuscating compilers?</li><ul><li>Obfuscation can be performed in a number of ways. For example, there are obfuscating assemblers, and various compiler tricks that can be done to aid in obfuscation.</li></ul><li>How often is obfuscation in play?</li><ul><li>It depends on your target, you&#x2019;ll find it often in games and other things that require some sort of DRM, but it&#x2019;s less common when looking at embedded firmware images for example.</li></ul><li>It would be great if you can give some pointer on how to identify packed or encrypted code using Ghidra</li><ul><li>There is a plugin here: <a href=https://hackaday.io/course/172292-introduction-to-reverse-engineering-with-ghidra/log/"https://github.com/d3v1l401/FindCrypt-Ghidra">https://github.com/d3v1l401/FindCrypt-Ghidra that can be used.</li><li>Identifying packed or encrypted code can also be done by performing entropy analysis on the code segment.&#xA0; <a href=https://hackaday.io/course/172292-introduction-to-reverse-engineering-with-ghidra/log/"https://github.com/ReFirmLabs/binwalk">Binwalk can do this with the -E option.</li></ul><li>Any binary can be reversed?</li><ul><li>Yes, technically"> http://www.jetbrains.com/decompiler/
  • Do people obfuscate by handwriting assembly or are there obfuscating compilers?</li><ul><li>Obfuscation can be performed in a number of ways. For example, there are obfuscating assemblers, and various compiler tricks that can be done to aid in obfuscation.</li></ul><li>How often is obfuscation in play?</li><ul><li>It depends on your target, you&#x2019;ll find it often in games and other things that require some sort of DRM, but it&#x2019;s less common when looking at embedded firmware images for example.</li></ul><li>It would be great if you can give some pointer on how to identify packed or encrypted code using Ghidra</li><ul><li>There is a plugin here: <a href=https://hackaday.io/course/172292-introduction-to-reverse-engineering-with-ghidra/log/"https://github.com/d3v1l401/FindCrypt-Ghidra">https://github.com/d3v1l401/FindCrypt-Ghidra that can be used.</li><li>Identifying packed or encrypted code can also be done by performing entropy analysis on the code segment.&#xA0; <a href=https://hackaday.io/course/172292-introduction-to-reverse-engineering-with-ghidra/log/"https://github.com/ReFirmLabs/binwalk">Binwalk can do this with the -E option.</li></ul><li>Any binary can be reversed?</li><ul><li>Yes, technically">
    Close

    Office Hour Questions 6/25/20

    A course class for Introduction to Reverse Engineering with Ghidra

    Learn how to reverse engineer software using Ghidra! This four-session course will walk you through the basics.

    wrongbaudwrongbaud 06/26/2020 at 11:450 Comments

    Office Hour Notes from 6/25/20

    Questions:

    Discussions