The following content is generated using a preview release of Swimlane's pyattck.
This snippet of data is scoped to the following actor groups:
- APT33
- APT34
- APT39
- Charming Kitten
The following content is generated using a preview release of Swimlane's pyattck.
This snippet of data is scoped to the following actor groups:
//------------------------------------------------ | |
//--- 010 Editor v8.0.1 Binary Template | |
// | |
// File: Transactional Registry Transaction Logs (.TxR) | |
// Authors: Willi Ballenthin <[email protected]> | |
// Version: 0.1 | |
// Reference: https://www.fireeye.com/blog/threat-research/2019/01/digging-up-the-past-windows-registry-forensics-revisited.html | |
//------------------------------------------------ | |
LittleEndian(); |
This brief tutorial will show you how to go about analyzing a raw binary firmware image in Ghidra.
I was recently interested in reversing some older Cisco IOS images. Those images come in the form of a single binary blob, without any sort of ELF, Mach-o, or PE header to describe the binary.
While I am using Cisco IOS Images in this example, the same process should apply to other Raw Binary Firmware Images.
rem USE AT OWN RISK AS IS WITHOUT WARRANTY OF ANY KIND !!!!! | |
rem https://technet.microsoft.com/en-us/itpro/powershell/windows/defender/set-mppreference | |
rem To also disable Windows Defender Security Center include this | |
rem reg add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f | |
rem 1 - Disable Real-time protection | |
reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f | |
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f | |
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f | |
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f | |
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f |
์๊ณ ๋ฆฌ์ฆ์ด๋ผ๊ณ ๋ง์ด ๋ค์ด๋ณด์ จ์ ๊ฒ๋๋ค. ์๊ณ ๋ฆฌ์ฆ์ ๊ต๊ณผ์์์ผ๋ก ์ ์ํด๋ณด๋ฉด '๋ฌธ์ ๋ฅผ ํด๊ฒฐํ๋ ์ผ๋ จ์ ์ ์ฐจ'๋ผ๊ณ ํ ์ ์๋๋ฐ์. ์ปดํจํฐ๋ก ์ด๋ค ๋ฌธ์ ๋ฅผ ํด๊ฒฐํด์ผ ํ ๋, ์ฝ๋ฉ์ผ๋ก ์ด๋ป๊ฒ ํด๊ฒฐํ ์ง์ ๋ํ ๊ตฌ์ฒด์ ์ธ ๋ฐฉ๋ฒ์ ์ด์ผ๊ธฐํฉ๋๋ค.
์๋ฅผ ๋ค์ด, ์ซ์ ๋ฐฐ์ด์ ์ ๋ ฌํ๋ ๋ฌธ์ ๊ฐ ์๋ค๊ณ ํฉ์๋ค. ์ธ๊ฐ์ด ๋ฐฐ์ด์ ๋์ถฉ ๋ณด๊ณ ์ ๋ ฌํ๊ธฐ๋ ์ฝ์ง๋ง ์์์ ๊ฐ์๊ฐ ์๋ฐฑ๋ง๊ฐ์ ๋ฌํ๋ ๋ฐฐ์ด์์ ์ปดํจํฐ์๊ฒ ์ผ์ ์์ผ์ ์ปดํจํฐ๊ฐ ์ ๋ ฌํ๊ฒ ํ๋ ๊ฒ์ ์ฝ์ง ์์ต๋๋ค. ์ค์ ๋ก ์ ๋ ฌ์ ์๊ณ ๋ฆฌ์ฆ์์ ๋งค์ฐ ์ ๋ช ํ๊ณ ๊ธฐ์ด์ ์ธ ๋ถ์ผ๋ก ์ ๋ ฌ์ ํ๋ ๋ฐฉ๋ฒ, ์ฆ ์๊ณ ๋ฆฌ์ฆ์ด ์ง๊ธ๊น์ง ์๋ ค์ง ๊ฒ๋ง ํด๋ ์์ญ๊ฐ์ง๊ฐ ๋ฉ๋๋ค.
์๊ณ ๋ฆฌ์ฆ์ ๊ณต๋ถํ๋ ๊ฒ์ ๊ฝค ๋์์ด ๋๋๋ฐ์. ์ผ๋จ ์ฝ๋ฉ์ ์์ํ์๋ ๋ถ๋ค ์ ์ฅ์์๋ ์ฝ๋ฉ์ ํ๊ฒ ๋์ ์ฝ๋ฉ๊ณผ ๋ฌธ๋ฒ์ ์ต์ํด์ง๋ ์ฅ์ ์ด ์๊ณ , ๋ ๊ฐ๋ฐ์์ ์ฌ๊ณ ๋ฅผ ํ๋ ๋ฐ ์๊ณ ๋ฆฌ์ฆ ๋ฌธ์ ๋ฅผ ํธ๋ ๊ฒ์ด ๋์์ด ๋ฉ๋๋ค. ์ด๋ค ๊ฐ๋ฐ ํ์ฌ๋ค์ ์๊ณ ๋ฆฌ์ฆ ๋ฅ๋ ฅ์ ํ ์คํธํ๊ธฐ ๋๋ฌธ์ ์ทจ์ ์ ๋ชฉํ๋ก ๊ณต๋ถํ์ ๋ค๋ฉด ์ํด๋ ๋ณด์ง ์์ต๋๋ค.
์ ๋ ์๊ณ ๋ฆฌ์ฆ์ ์ข์ํด์ ์กฐ๊ธ์ฉ ํ์ด์๋๋ฐ์. ์๊ณ ๋ฆฌ์ฆ์ ํ ์ ์๋๋ก ๋ฌธ์ ๋ฅผ ๋ด์ฃผ๋ ์ฌ์ดํธ๋ค์ด ์ ๋ง ๋ง์ต๋๋ค. ์ค๋์ ๊ทธ์ค์์ ๋ช ๊ฐ์ง๋ง ์๊ฐํด๋๋ฆฌ๊ฒ ์ต๋๋ค. ์ฌ์ดํธ๋ ์ ๋ง ๋ง์๋ฐ์, ๊ทธ์ค์์ ์ ๊ฐ ์ต์ ๋ช ๋ฒ์ด๋ผ๋ ์จ๋ณธ ์ฌ์ดํธ๋ค๋ง ์๊ฐํ๊ฒ ์ต๋๋ค. ๋ ์ข์ ์ฌ์ดํธ๋ค์ด ์์ผ๋ฉด ์๊ฐํด์ฃผ์๋ฉด ์ถ๊ฐํ ์ ์์ ๊ฒ ๊ฐ์ต๋๋ค.
import sys | |
from PySide2.QtWidgets import (QApplication, QDialog, QPushButton, QLabel, QHBoxLayout) | |
from PySide2.QtCore import Qt | |
from binaryninjaui import (UIAction, UIActionHandler, Menu) | |
class GreatUI(QDialog): | |
def __init__(self, parent=None): | |
super(GreatUI, self).__init__(parent) | |
self.setWindowModality(Qt.NonModal) |
// Launch WinAFL with current function as hook location | |
//@author richinseattle | |
//@category _NEW_ | |
//@keybinding | |
//@menupath | |
//@toolbar | |
// Usage: | |
// Install DynamoRIO and WinAFL | |
// Add LaunchWinAFL to Ghidra scripts |
############################################################################## | |
# | |
# Name: hello_world_plugin.py | |
# Auth: @cmatthewbrooks | |
# Desc: A test plugin to learn how to make these work; Specifically, how to | |
# have multiple actions within the same plugin. | |
# | |
# In plain English, IDA will look for the PLUGIN_ENTRY function which | |
# should return a plugin object. This object can contain all the | |
# functionality itself, or it can have multiple actions. |
As the Ghidra open source community is growing, trying to document the new projects around Ghidra. Feel free to fork the gist and propose improvements.