HomeCyber BalkansGhidra 11.3 Released - Significant Upgrade to NSA's Open-Source Tool

Ghidra 11.3 Released – Significant Upgrade to NSA’s Open-Source Tool

Published on

spot_img

The National Security Agency (NSA) has unveiled the latest version of its open-source software reverse engineering (SRE) framework, Ghidra 11.3, aiming to enhance the capabilities of cybersecurity professionals in analyzing compiled code across various platforms.

This update brings significant improvements to the debugging functionality of Ghidra. It now supports macOS kernel debugging via LLDB and Windows kernel debugging in virtual machines using eXDI. The introduction of TraceRMI-based implementation replaces the outdated “IN-VM” connectors, enhancing debugging efficiency across diverse environments. Additionally, a new Just-in-Time (JIT) p-code emulator has been incorporated to accelerate emulation performance for scripting and plugin development.

Integration with modern development tools is another key highlight of this release. Ghidra 11.3 now integrates with Visual Studio Code (VS Code), offering users a modern alternative to Eclipse for development tasks. This integration allows users to create module projects or edit scripts directly within VS Code, benefiting from advanced features like autocomplete and navigation, simplifying the workflow for developers.

Moreover, Ghidra 11.3 introduces improved visualization tools, including new “Flow Chart” layouts in the function graph interface. These layouts help in organizing code blocks and enhancing readability, making it easier for analysts to navigate complex functions.

The update also brings new features to streamline reverse engineering tasks. A LibreTranslate plugin enables offline string translation of binary data, while a new search feature allows users to query decompiled text across all functions in a binary. The PyGhidra library is now fully integrated into the framework, providing native CPython 3 access to Ghidra’s API, thereby expanding scripting capabilities. Processor support has been enhanced with updates for x86 AVX-512 instructions, ARM VFPv2 disassembly, and Golang 1.23 binaries, ensuring compatibility with a broader range of architectures and programming languages.

Although Ghidra 11.3 maintains backward compatibility with project data from earlier versions, features that are not compatible with older releases of the software have been introduced. Users are required to install Java Development Kit (JDK) 21 (64-bit) and Python 3 (versions 3.9–3.13) to use the debugger or perform source builds.

The NSA’s release of Ghidra 11.3 addresses numerous bugs, including issues with recursive structures in the decompiler and breakpoint toggling in LLDB. Documentation has been updated to Markdown format for easier navigation, solidifying Ghidra’s position as an indispensable tool for reverse engineering and cybersecurity analysis worldwide.

With these enhancements, Ghidra 11.3 continues to be a valuable resource for cybersecurity professionals, offering advanced capabilities for analyzing and interpreting compiled code across multiple platforms.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...