이 강의를 보기 전까지 디버깅은 무조건 IDA라고 생각했습니다. 물론 IDA가 조금 더 보기 쉬운 인터페이스를 가지고 있기는 하지만, free 버전 사용에 따른 제약이 다소 있었는데, ghidra의 경우 이런 부분을 해소할 수 있고 다양한 확장성을 가지고 있음을 이 강의를 통해 알게 되었습니다. 특히 스크립팅 기능에 대한 강의가 매우 큰 도움이 되었습니다.
How to Use Ghidra
This path is designed for learners who are new to Ghidra as well as those who want to build practical skills. Starting from the installation process, it covers not only Ghidra's basic features but also advanced techniques such as binary diffing and symbolic execution. Each feature is introduced through clear explanations and hands-on exercises, allowing learners to naturally understand Ghidra's core capabilities and develop the skills to apply them in real-world scenarios.
How to Use Ghidra
This path is designed for learners who are new to Ghidra as well as those who want to build practical skills. Starting from the installation process, it covers not only Ghidra's basic features but also advanced techniques such as binary diffing and symbolic execution. Each feature is introduced through clear explanations and hands-on exercises, allowing learners to naturally understand Ghidra's core capabilities and develop the skills to apply them in real-world scenarios.
Retail Price
450 coins
When you subscribe
Free
0% Completed
Total 0 completed
Lecture
0 /15
15
Wargame
0 /6
6
Why It's Worth Your Time
Ghidra, a powerful free and open-source reverse engineering tool developed by the NSA, is widely used across various security fields, including malware analysis, vulnerability research, and general program analysis. Reverse engineering is an essential skill for white-hat hackers, bug bounty hunters, vulnerability researchers, and malware analysts. This path is designed to help learners build the practical skills needed for these security roles, using Ghidra 10.1.4 as the reference version.
Topics Covered
- Step-by-step learning from Ghidra installation to basic and advanced usage
- Practical problem-solving with Ghidra
- Binary patching using Ghidra
- Dynamic debugging with Ghidra and GDB
- Automating program analysis with Ghidra scripting
- Advanced techniques like collaborative reverse engineering, binary diffing, and symbolic execution
Recommended For
- Aspiring white-hat hackers, malware analysts, and vulnerability researchers
- Anyone curious about the Ghidra reverse engineering tool
- Those who want a structured approach to mastering Ghidra
Prerequisite Knowledge
- Basic understanding of reverse engineering
- Linux environment and basic Linux usage skills (required for the dynamic debugging unit)
Unit Composition
- 1
- 2100Coin
Free with subscription
100CoinFree with subscription
This unit teaches you how to manage projects and analyze code in Ghidra, while building your reverse engineering skills through simple Crack Me challenges.Code Browser 1Code Browser 1[Exercise] Simple Crack MeExercise: Simple Crack MeSimple Crack MeCode Browser 2Code Browser 2[Exercise] Simple Crack Me 2Exercise: Simple Crack Me 2Simple Crack Me 2 - 3
- 4100Coin
Free with subscription
100CoinFree with subscription
Learn how to use the Ghidra debugger. Set up a debugging environment with Ghidra and GDB, and get hands-on experience to become familiar with the Ghidra debugger.Ghidra DebuggerGhidra Debugger[Exercise] Check Function ArgumentExercise: Check Function ArgumentCheck Function Argument[Exercise] Check Return ValueExercise: Check Return ValueCheck Return Value - 5
- 6
- 7
- 8
Reviews
Retail Price
450 coins
When you subscribe
Free
0% Completed
Total 0 completed
Lecture
0 /15
15
Wargame
0 /6
6