Magic Lantern Forum

Developing Magic Lantern => Reverse Engineering => Topic started by: mothaibaphoto on January 21, 2019, 04:37:51 AM

Title: Free NSA Reverse Engineering Tool
Post by: mothaibaphoto on January 21, 2019, 04:37:51 AM
Maybe this will be useful for devs?
https://www.rsaconference.com/events/us19/agenda/sessions/16608-Come-Get-Your-Free-NSA-Reverse-Engineering-Tool
It kinda decompile C code, platform independent... And free, maybe even open-source!!!
Title: Re: Free NSA Reverse Engineering Tool
Post by: sudo-i on February 07, 2019, 05:20:40 PM
can be, but the whole magic lantern system built from ground up.
Title: Re: Free NSA Reverse Engineering Tool
Post by: calle2010 on March 11, 2019, 02:53:16 PM
I have no experience with the commercial IDA tool or generally ARM assembler but wanted to support the porting efforts for the 77D model.

So far I have little results but at least a stable build environment. ;) I used it to toy around with Ghidra. Here are my first steps so far:
https://github.com/calle2010/magic-lantern-77d-vagrant/blob/master/ghidra.md

At least I could make sense of some of the bootloader code. Also Ghidra finds functions, strings, embedded JPEG images and other data. It can be scripted with Java or Python, but I haven't tried this yet.

If anybody has tipps and hints on how to use Ghidra effectively I would be happy about replies.