How to Use Ghidra
10.0
(1)
Tier 1 Easy Skill Path Reverse Engineering
This path is designed for learners who are new to Ghidra as well as those who want to build practical skills. Starting from the installation process, it covers not only Ghidra's basic features but also advanced techniques such as binary diffing and symbolic execution. Each feature is introduced through clear explanations and hands-on exercises, allowing learners to naturally understand Ghidra's core capabilities and develop the skills to apply them in real-world scenarios.
How to Use Ghidra
10.0
(1)
Tier 1 Easy Skill Path Reverse Engineering
This path is designed for learners who are new to Ghidra as well as those who want to build practical skills. Starting from the installation process, it covers not only Ghidra's basic features but also advanced techniques such as binary diffing and symbolic execution. Each feature is introduced through clear explanations and hands-on exercises, allowing learners to naturally understand Ghidra's core capabilities and develop the skills to apply them in real-world scenarios.
Retail Price
450 coins
When you subscribe
Free
0% Completed Total 0 completed
Lecture 0 /15
15
Wargame 0 /6
6
You can access locked objectives by upgrading your plan or purchasing the units separately.

Why It's Worth Your Time

Ghidra, a powerful free and open-source reverse engineering tool developed by the NSA, is widely used across various security fields, including malware analysis, vulnerability research, and general program analysis. Reverse engineering is an essential skill for white-hat hackers, bug bounty hunters, vulnerability researchers, and malware analysts. This path is designed to help learners build the practical skills needed for these security roles, using Ghidra 10.1.4 as the reference version.

Topics Covered

  • Step-by-step learning from Ghidra installation to basic and advanced usage
  • Practical problem-solving with Ghidra
  • Binary patching using Ghidra
  • Dynamic debugging with Ghidra and GDB
  • Automating program analysis with Ghidra scripting
  • Advanced techniques like collaborative reverse engineering, binary diffing, and symbolic execution

Recommended For

  • Aspiring white-hat hackers, malware analysts, and vulnerability researchers
  • Anyone curious about the Ghidra reverse engineering tool
  • Those who want a structured approach to mastering Ghidra

Prerequisite Knowledge

  • Basic understanding of reverse engineering
  • Linux environment and basic Linux usage skills (required for the dynamic debugging unit)
Unit Composition
Total 8 units
  1. 1
    10.0
    (6)
    Free
    10.0
    (6)
    Free
    This unit covers an introduction to Ghidra and how to install it.
    Install Ghidra
    Install Ghidra
  2. 2
    0.0
    (0)
    100
    Coin
    Free with subscription
    0.0
    (0)
    100
    Coin
    Free with subscription
    This unit teaches you how to manage projects and analyze code in Ghidra, while building your reverse engineering skills through simple Crack Me challenges.
    Code Browser 1
    Code Browser 1
    [Exercise] Simple Crack Me
    Exercise: Simple Crack Me
    Simple Crack Me
    Code Browser 2
    Code Browser 2
    [Exercise] Simple Crack Me 2
    Exercise: Simple Crack Me 2
    Simple Crack Me 2
  3. 3
    0.0
    (0)
    50
    Coin
    Free with subscription
    0.0
    (0)
    50
    Coin
    Free with subscription
    Learn how to patch program binaries using Ghidra, even without access to the source code.
    Binary Patch
    Binary patches
    [Exercise] Simple Patch Me
    Exercise: Simple Patch Me
    Simple Patch Me
  4. 4
    0.0
    (0)
    100
    Coin
    Free with subscription
    0.0
    (0)
    100
    Coin
    Free with subscription
    Learn how to use the Ghidra debugger. Set up a debugging environment with Ghidra and GDB, and get hands-on experience to become familiar with the Ghidra debugger.
    Ghidra Debugger
    Ghidra Debugger
    [Exercise] Check Function Argument
    Exercise: Check Function Argument
    Check Function Argument
    [Exercise] Check Return Value
    Exercise: Check Return Value
    Check Return Value
  5. 5
    0.0
    (0)
    50
    Coin
    Free with subscription
    0.0
    (0)
    50
    Coin
    Free with subscription
    Learn how to automate program analysis with Ghidra scripting and apply it to solve a challenge together.
    Ghidra Scripting
    Ghidra scripting
    [Exercise] Collect Me
    Exercise: Collect Me
    Collect Me
  6. 6
    50
    Coin
    Free with subscription
    0.0
    (0)
    50
    Coin
    Free with subscription
    Learn how to perform collaborative reverse engineering using Ghidra.
    Reverse Engineering Collaboration
    Collaborative reverse engineering
  7. 7
    0.0
    (0)
    50
    Coin
    Free with subscription
    0.0
    (0)
    50
    Coin
    Free with subscription
    Explore binary diffing techniques using Ghidra and BinDiff for patch analysis.
    Ghidra Binary Diffing
    Ghidra Binary Dipping
  8. 8
    0.0
    (0)
    50
    Coin
    Free with subscription
    0.0
    (0)
    50
    Coin
    Free with subscription
    Learn how to perform symbolic execution using Ghidra scripting and angr.
    Ghidra Symbolic Execution
    Run Ghidra Symbols
Reviews
10.0 (1)
8 days ago

이 강의를 보기 전까지 디버깅은 무조건 IDA라고 생각했습니다. 물론 IDA가 조금 더 보기 쉬운 인터페이스를 가지고 있기는 하지만, free 버전 사용에 따른 제약이 다소 있었는데, ghidra의 경우 이런 부분을 해소할 수 있고 다양한 확장성을 가지고 있음을 이 강의를 통해 알게 되었습니다. 특히 스크립팅 기능에 대한 강의가 매우 큰 도움이 되었습니다.

Retail Price
450 coins
When you subscribe
Free
0% Completed Total 0 completed
Lecture 0 /15
15
Wargame 0 /6
6
You can access locked objectives by upgrading your plan or purchasing the units separately.