How to Use Ghidra
10.0
(3)
Tier 1 Easy Skill Path Reverse Engineering
Learn Ghidra's basic features and advanced applications through hands-on exercises. Completing this Path will give you an understanding of Ghidra's core functionalities, as well as help you develop skills for applying it in real-world scenarios.
How to Use Ghidra
10.0
(3)
Tier 1 Easy Skill Path Reverse Engineering
Learn Ghidra's basic features and advanced applications through hands-on exercises. Completing this Path will give you an understanding of Ghidra's core functionalities, as well as help you develop skills for applying it in real-world scenarios.
Retail Price
450 coins
When you subscribe
Free
0% Completed Total 0 completed
Lecture 0 /15
15
Wargame 0 /6
6
You can access locked objectives by upgrading your plan or purchasing the units separately.
The Lab is a practice and is not included in the overall progress.

Why It's Worth Your Time

Ghidra, a powerful free and open-source reverse engineering tool developed by the NSA, is widely used across various security fields, including malware analysis, vulnerability research, and general program analysis. Reverse engineering is an essential skill for white-hat hackers, bug bounty hunters, vulnerability researchers, and malware analysts. This Path is designed to help learners build the practical skills needed for these security roles, using Ghidra 10.1.4 as the reference version.

Topics Covered

  • Step-by-step learning from Ghidra installation to basic and advanced usage
  • Practical problem-solving with Ghidra
  • Binary patching using Ghidra
  • Dynamic debugging with Ghidra and GDB
  • Automating program analysis with Ghidra scripting
  • Advanced techniques like collaborative reverse engineering, binary diffing, and symbolic execution

Recommended For

  • Aspiring white-hat hackers, malware analysts, and vulnerability researchers
  • Anyone curious about the Ghidra reverse engineering tool
  • Those who want a structured approach to mastering Ghidra

Prerequisite Knowledge

  • Basic understanding of reverse engineering
  • Linux environment and basic Linux usage skills (required for the dynamic debugging Unit)
Unit Composition
Total 8 units
  1. 1
    9.7
    (83)
    Free
    9.7
    (83)
    Free
    Learn about Ghidra, including how to install and run the tool.
    Install Ghidra
    Install Ghidra
  2. 2
    9.7
    (18)
    100
    Coin
    Free with subscription
    9.7
    (18)
    100
    Coin
    Free with subscription
    Learn how to use Code Browser, the most fundamental analysis tool in Ghidra, and build your reverse engineering skills through simple Crack Me challenges.
    Code Browser 1
    Code Browser 1
    [Exercise] Simple Crack Me
    Exercise: Simple Crack Me
    Simple Crack Me
    Code Browser 2
    Code Browser 2
    [Exercise] Simple Crack Me 2
    Exercise: Simple Crack Me 2
    Simple Crack Me 2
  3. 3
    9.4
    (17)
    50
    Coin
    Free with subscription
    9.4
    (17)
    50
    Coin
    Free with subscription
    Learn how to use Ghidra to directly modify and patch a program’s binary without access to the source code.
    Binary Patch
    Binary patches
    [Exercise] Simple Patch Me
    Exercise: Simple Patch Me
    Simple Patch Me
  4. 4
    9.4
    (7)
    100
    Coin
    Free with subscription
    9.4
    (7)
    100
    Coin
    Free with subscription
    Set up a debugging environment using Ghidra and GDB, and learn how to use the Ghidra debugger through hands-on practice.
    Ghidra Debugger
    Ghidra Debugger
    [Exercise] Check Function Argument
    Exercise: Check Function Argument
    Check Function Argument
    [Exercise] Check Return Value
    Exercise: Check Return Value
    Check Return Value
  5. 5
    10.0
    (3)
    50
    Coin
    Free with subscription
    10.0
    (3)
    50
    Coin
    Free with subscription
    Learn how to automate program analysis with Ghidra scripting and apply it to solve a challenge together.
    Ghidra Scripting
    Ghidra scripting
    [Exercise] Collect Me
    Exercise: Collect Me
    Collect Me
  6. 6
    50
    Coin
    Free with subscription
    10.0
    (8)
    50
    Coin
    Free with subscription
    Learn how to perform collaborative reverse engineering using Ghidra.
    Reverse Engineering Collaboration
    Collaborative reverse engineering
  7. 7
    9.9
    (8)
    50
    Coin
    Free with subscription
    9.9
    (8)
    50
    Coin
    Free with subscription
    Learn how to effectively analyze differences between software versions using binary diffing techniques with Ghidra and BinDiff.
    Ghidra Binary Diffing
    Ghidra Binary Dipping
  8. 8
    9.8
    (5)
    50
    Coin
    Free with subscription
    9.8
    (5)
    50
    Coin
    Free with subscription
    Learn how to perform symbolic execution using Ghidra scripting and angr.
    Ghidra Symbolic Execution
    Run Ghidra Symbols
Reviews
10.0 (3)
5 months ago

처음 Dreamhack을 접했을 때는 "이거 너무 어려운 거 아냐?"라는 걱정부터 들었는데, 막상 해보니 놀라울 정도로 잘 구성되어 있어서 이해하기 쉬웠습니다.

6 months ago

기드라를 그동안 간단하게만 사용해왔는데, 정말 도움되는 많은 기능을 배울 수 있었습니다. 업무에도 활용할 가능성이 무궁무진하네요. 좋은 강의입니다. 다만 마지막 binexport와 angr 부분에서는 교육과정에 맞는 운영체제, 기드라 버전을 사용하고 있음에도 빌드, 실행시에 오류가 많아서 제대로 강의 진행이 안되는 어려움이 있었습니다. 이 부분은 최신 버전에 맞게 업데이트 되었으면 좋겠습니다.

10 months ago

이 강의를 보기 전까지 디버깅은 무조건 IDA라고 생각했습니다. 물론 IDA가 조금 더 보기 쉬운 인터페이스를 가지고 있기는 하지만, free 버전 사용에 따른 제약이 다소 있었는데, ghidra의 경우 이런 부분을 해소할 수 있고 다양한 확장성을 가지고 있음을 이 강의를 통해 알게 되었습니다. 특히 스크립팅 기능에 대한 강의가 매우 큰 도움이 되었습니다.

Retail Price
450 coins
When you subscribe
Free
0% Completed Total 0 completed
Lecture 0 /15
15
Wargame 0 /6
6
You can access locked objectives by upgrading your plan or purchasing the units separately.
The Lab is a practice and is not included in the overall progress.