-
Book Overview & Buying
-
Table Of Contents
Ghidra Software Reverse-Engineering for Beginners - Second Edition
By :
Ghidra Software Reverse-Engineering for Beginners
By:
Overview of this book
Written by David Álvarez Pérez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs.
This updated edition walks you through implementing Ghidra’s capabilities and automating reverse-engineering tasks with its plugins. You’ll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too.
This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you’ll acquire the skills necessary for handling real-world cybersecurity challenges.
By the end of this Ghidra book, you’ll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies.
Table of Contents (27 chapters)
Preface
Chapter 1: Getting Started with Ghidra
Chapter 2: Automating RE Tasks with Ghidra Scripts
Chapter 3: Ghidra Debug Mode
Chapter 4: Using Ghidra Extensions
Part 2: Reverse-Engineering
Chapter 5: Reversing Malware Using Ghidra
Chapter 6: Scripting Malware Analysis
Chapter 7: Using Ghidra’s Headless Analyzer
Part 3: Binary Analysis
Chapter 8: Binary Diffing
Chapter 9: Auditing Program Binaries
Chapter 10: Scripting Binary Audits
Part 4: Extending Ghidra for Advanced Reverse-Engineering
Chapter 11: Developing Ghidra Plugins
Chapter 12: Incorporating New Binary Formats
Chapter 13: Analyzing Processor Modules
Chapter 14: Contributing to the Ghidra Community
Chapter 15: Extending Ghidra for Advanced Reverse-Engineering
Part 5: Debugging and Applied Malware Analysis
Chapter 16: Debugging
Chapter 17: Unpacking in-the-Wild Malware
Chapter 18: Reverse-Engineering Ransomware
Index
Other Books You May Enjoy
Appendix A: Answer Key