Ghidra: Perbedaan antara revisi
Konten dihapus Konten ditambahkan
v10.1.2 |
Rescuing 11 sources and tagging 0 as dead.) #IABot (v2.0.9.5 |
||
Baris 14:
| ver layout =
| latest release version = 10.1.2
| latest release date = {{Start date and age|2022|01|27}}<ref>{{Cite web|url=https://github.com/NationalSecurityAgency/ghidra/releases|title=Releases NationalSecurityAgency/ghidra|via=GitHub|access-date=1 Februari 2022|archive-date=2023-07-30|archive-url=https://web.archive.org/web/20230730222143/https://github.com/NationalSecurityAgency/ghidra/releases|dead-url=no}}</ref>
| latest preview version =
| latest preview date =
Baris 26:
| language footnote =
| genre =
| license = [[Lisensi Apache|Lisensi Apache 2.0]] / [[Domain publik]]<ref>{{cite web|url=https://github.com/NationalSecurityAgency/ghidra/blob/79d8f164f8bb8b15cfb60c5d4faeb8e1c25d15ca/NOTICE|title=ghidra/NOTICE|access-date=13 April 2019|via=GitHub|archive-date=2022-10-27|archive-url=https://web.archive.org/web/20221027123954/https://github.com/NationalSecurityAgency/ghidra/blob/79d8f164f8bb8b15cfb60c5d4faeb8e1c25d15ca/NOTICE|dead-url=no}}</ref>
| alexa =
| website = {{URL|https://ghidra-sre.org/}}
Baris 32:
| AsOf =
}}
'''Ghidra''' ({{font|size=85%|pengucapan bahasa Inggris:}} Gee-druh;<ref>{{cite web|title=Frequently asked questions|url=https://github.com/NationalSecurityAgency/ghidra/wiki/Frequently-asked-questions#how-do-you-pronounce-ghidra|via=GitHub|access-date=7 Maret 2019|archive-date=2019-03-05|archive-url=https://web.archive.org/web/20190305235545/https://github.com/NationalSecurityAgency/ghidra/wiki/Frequently-asked-questions#how-do-you-pronounce-ghidra|dead-url=no}}</ref> {{IPAc-en|ˈ|ɡ|iː|d|r|ə|}}<ref>{{cite web|title=Come Get Your Free NSA Reverse Engineering Tool!|url=https://www.youtube.com/watch?v=r3N13ig8H7s&t=4|author=RSA Conference|website=YouTube|access-date=17 Mei 2019|archive-date=2020-05-21|archive-url=https://web.archive.org/web/20200521102550/https://www.youtube.com/watch?v=r3N13ig8H7s&t=4|dead-url=no}}</ref>) adalah perkakas [[rekayasa balik]] bebas dan sumber terbuka yang dikembangkan oleh [[Badan Keamanan Nasional]] (NSA) Amerika Serikat. Binernya dirilis pada Maret 2019 di [[RSA Conference]]; kode sumbernya dipublikasikan sebulan kemudian di [[GitHub]].<ref name="wired release article">{{cite web|title=The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source|url=https://www.wired.com/story/nsa-ghidra-open-source-tool/|last=Newman|first=Lily Hay|date=3 Mei 2019|website=Wired|access-date=6 Maret 2019|archive-date=2019-03-06|archive-url=https://web.archive.org/web/20190306095048/https://www.wired.com/story/nsa-ghidra-open-source-tool/|dead-url=no}}</ref><ref>{{Cite web|url=https://www.linuxjournal.com/content/github-announces-free-accounts-now-can-create-private-repositories-bash-50-released-iphone|title=GitHub Announces that Free Accounts Now Can Create Private Repositories, Bash-5.0 Released, iPhone Apps Linked to Golduck Malware, Godot Game Engine Reaches 3.1 Beta, NSA to Open-Source Its GHIDRA Reverse-Engineering Tool|last=Franklin|first=Jill|date=8 Januari 2019|website=Linux Journal|access-date=23 September 2021|archive-date=2022-10-27|archive-url=https://web.archive.org/web/20221027125528/https://www.linuxjournal.com/content/github-announces-free-accounts-now-can-create-private-repositories-bash-50-released-iphone|dead-url=no}}</ref> Ghidra dipandang oleh banyak peneliti keamanan sebagai pesaing [[IDA Pro]].<ref name="Ghidra release">{{Cite web|url=https://www.zdnet.com/article/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit/|title=NSA releases Ghidra, a free software reverse engineering toolkit|last=Cimpanu|first=Catalin|website=ZDNet|access-date=7 Maret 2019|archive-date=2019-03-06|archive-url=https://web.archive.org/web/20190306041159/https://www.zdnet.com/article/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit/|dead-url=no}}</ref> Perangkat lunak ini ditulis dalam [[Java]] menggunakan [[Swing (Java)|kerangka kerja Swing]] untuk [[Graphical user interface|GUI]]-nya. Sedangkan komponen [[dekompilator]]nya ditulis dalam [[C++]]. Plugin Ghidra dapat dibuat dalam bahasa pemrograman Java atau Python (melalui [[Jython]]).<ref>{{cite web|url=https://github.com/0xAlexei/INFILTRATE2019/blob/master/INFILTRATE%20Ghidra%20Slides.pdf|title=Three Heads are Better Than One: Mastering NSA’s Ghidra Reverse Engineering Tool|via=GitHub|access-date=30 September 2019|archive-date=2020-03-01|archive-url=https://web.archive.org/web/20200301211705/https://github.com/0xAlexei/INFILTRATE2019/blob/master/INFILTRATE%20Ghidra%20Slides.pdf|dead-url=no}}</ref>
== Sejarah ==
Ghidra awalnya terungkap ke publik melalui [[WikiLeaks]] pada Maret 2017,<ref>{{Cite web|title=Ghidra|url=https://wikileaks.org/ciav7p1/cms/page_51183656.html|website=[[WikiLeaks]]|access-date=22 Maret 2019|agency=[[National Security Agency]]|archive-date=2017-03-07|archive-url=https://web.archive.org/web/20170307155609/https://wikileaks.org/ciav7p1/cms/page_51183656.html|dead-url=no}}</ref> tetapi perangkat lunak ini tidak tersedia bagi publik sampai status kerahasiaannya dicabut dan secara resmi dirilis dua tahun kemudian.<ref name="wired release article"/><ref name="phoronix">{{cite web|url=https://www.phoronix.com/scan.php?page=news_item&px=Ghidra-Coreboot-NSA-RE|title=Coreboot Project Is Leveraging NSA Software To Help With Firmware Reverse Engineering|last=Larabel|first=Michael|date=4 Juni 2019|website=Phoronix|access-date=23 September 2021|archive-date=2009-09-21|archive-url=https://web.archive.org/web/20090921053923/https://www.phoronix.com/scan.php?page=news_item&px=Ghidra-Coreboot-NSA-RE|dead-url=no}}</ref>
Pada Juni 2019, [[coreboot]] mulai menggunakan Ghidra untuk upaya [[Rekayasa balik|perekayasaan baliknya]] pada masalah [[perangkat tegar]] setelah dirilisnya kode sumber [[paket perangkat lunak]] Ghidra.<ref name="phoronix" />
Ghidra dapat digunakan sebagai [[pengawakutu]] sejak Ghidra 10.0. Pengawakutu milik Ghidra mendukung pengawakutuan dalam mode pengguna pada program Windows melalui [[WinDbg]], dan program Linux melalui [[GNU Debugger|GDB]].<ref>{{cite web|url=https://htmlpreview.github.io/?https://github.com/NationalSecurityAgency/ghidra/blob/Ghidra_10.0_build/Ghidra/Configurations/Public_Release/src/global/docs/WhatsNew.html|title=What's new in Ghidra 10.0|author=NSA|via=GitHub & BitBucket HTML Preview|access-date=2021-09-23|archive-date=2023-06-19|archive-url=https://web.archive.org/web/20230619084429/https://htmlpreview.github.io/?https://github.com/NationalSecurityAgency/ghidra/blob/Ghidra_10.0_build/Ghidra/Configurations/Public_Release/src/global/docs/WhatsNew.html|dead-url=no}}</ref>
== Arsitektur yang didukung ==
|