Author Topic: Free NSA Reverse Engineering Tool  (Read 4268 times)

mothaibaphoto

  • Senior
  • ****
  • Posts: 393
  • pesky kid
Free NSA Reverse Engineering Tool
« on: January 21, 2019, 04:37:51 AM »
Maybe this will be useful for devs?
https://www.rsaconference.com/events/us19/agenda/sessions/16608-Come-Get-Your-Free-NSA-Reverse-Engineering-Tool
It kinda decompile C code, platform independent... And free, maybe even open-source!!!

sudo-i

  • New to the forum
  • *
  • Posts: 5
Re: Free NSA Reverse Engineering Tool
« Reply #1 on: February 07, 2019, 05:20:40 PM »
can be, but the whole magic lantern system built from ground up.

calle2010

  • Contributor
  • New to the forum
  • *****
  • Posts: 47
Re: Free NSA Reverse Engineering Tool
« Reply #2 on: March 11, 2019, 02:53:16 PM »
I have no experience with the commercial IDA tool or generally ARM assembler but wanted to support the porting efforts for the 77D model.

So far I have little results but at least a stable build environment. ;) I used it to toy around with Ghidra. Here are my first steps so far:
https://github.com/calle2010/magic-lantern-77d-vagrant/blob/master/ghidra.md

At least I could make sense of some of the bootloader code. Also Ghidra finds functions, strings, embedded JPEG images and other data. It can be scripted with Java or Python, but I haven't tried this yet.

If anybody has tipps and hints on how to use Ghidra effectively I would be happy about replies.