Developers: | National Security Agency (NSA) of the USA |
Branches: | Information technologies |
Technology: | Development tools of applications |
Content |
2019
In the declassified platform of the NSA for search of vulnerabilities found own "hole"
The expert in information security detected critical vulnerability in the platform of the U.S. National Security Agency (NSA) Ghidra. Vulnerability allows to start in it any code far off.
Ghidra represents the cross-platform framework written on Java intended for the return engineering (research) of the ready software and search of vulnerabilities. Existence of this system for the first time became known in 2017 when the resource of WikiLeaks within the campaign Vault 7 merged the large volume of non-public data on hacker tools of CIA and methods of its use. Among these documents also Ghidra is mentioned.
In March, 2019 the NSA published the source code Ghidra, having made thus once confidential platform public property.
Disclosure of source codes
At the beginning of January, 2019 the U.S. National Security Agency announced that it is going to open source codes of the tool for the analysis of the code of the software.
The solution under the name GHIDRA includes an interactive disassembler with support of decompiling in the code in language C and means for the analysis of executable files. Thanks to GHIDRA software developers and normal users can reveal malware and another suspicious software.
GHIDRA is written in language Java, has the graphical interface and is compatible to operating systems Linux, Mac and Windows. Using GHIDRA it is also possible to analyze binary files of all main OS, including mobile platforms, such Android as well as iOS. Thanks to modular architecture of the tool users can add new features to the existing platforms.
Officially this tool was never considered as confidential, but the NSA held back its existence till March, 2017 though it several times appeared in the documents received as a result of date leak from the closed NSA network and placed on WikiLeaks. According to these documents, the project was started at the beginning of the 2000th years and was used by several government agencies.
Users of Hacker News, Reddit and Twitter compare GHIDRA to the commercial instrument of the return engineering under the name IDA. The majority agree that IDA is stabler and reliable platform, but note that it is software very expensively and to inaccessibly normal user. The analyst of Constellation Research company notes that the NSA for certain hopes for the help of users in error correction of GHIDRA that will help to make it much more competitive tool.
The NSA is going to open source codes of GHIDRA at the beginning of March, 2019 at the RSA Security Conference 2019 conference.[1]
See Also
- Censorship on the Internet. World experience
- Censorship (control) on the Internet. Experience of China
- Censorship (control) on the Internet. Experience of Russia, Roskomnadzor
- Law on regulation of Runet
- VPN and privacy (anonymity, anonymizers)
- Protection of critical information infrastructure of Russia
- Law On security of critical information infrastructure of the Russian Federation
- National Biometric Platform (NBP)
- Single Biometric System (SBS) of these clients of banks
- Biometric identification (market of Russia)
- Directory of solutions and projects of biometrics
- Digital economy of Russia
- Information security of digital economy of Russia
- SORM (System for Operative Investigative Activities)
- State detection system, warnings and mitigations of consequences of the computer attacks (State system of detection, prevention and elimination of consequences of computer attacks)
- National filtering system of Internet traffic (NASFIT)
- Yastreb-M Statistics of telephone conversations
- How to bypass Internet censorship of the house and at office: 5 easy ways
- The auditor - a control system of blocking of the websites in Russia
- The Single Network of Data Transmission (SNDT) for state agencies (Russian State Network, RSNet)
- Data network of public authorities (SPDOV)
- Single network of telecommunication of the Russian Federation
- Electronic Government of the Russian Federation
- Digital economy of Russia
- Cyber crime in the world
- Requirements of a NIST
- Global index of cyber security
- Cyber wars, Cyber war of Russia and USA
- Cyber crime and cyber conflicts: Russia, FSB, National coordination center for computer incidents (NKTsKI), Information Security Center (ISC) of FSB, Management of K BSTM of the Ministry of Internal Affairs of the Russian Federation, Ministry of Internal Affairs of the Russian Federation, Ministry of Defence of the Russian Federation, National Guard of the Russian Federation
- Cyber crime and cyber conflicts: Ukraine
- Cyber crime and cyber conflicts: USA, CIA, NSA, FBI, US Cybercom, U.S. Department of Defense, NATO, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA)
- Cyber crime and cyber conflicts: Europe, ENISA
- Cyber crime and cyber conflicts: Israel
- Cyber crime and cyber conflicts: Iran
- Cyber crime and cyber conflicts: China
- As the USA spied on production of chips in the USSR
- Security risks of communication in a mobile network
- Information security in banks
- Digital transformation of the Russian banks
- Overview: IT in banks 2016
- The policy of the Central Bank in the field of data protection (cyber security)
- Losses of the organizations from cyber crime
- Losses of banks from cyber crime
- Trends of development of IT in insurance (cyberinsurance)
- Cyber attacks
- Overview: Security of information systems
- Information security
- Information security (world market)
- Information security (market of Russia)
- The main trends in data protection
- Software for data protection (world market)
- Software for data protection (the market of Russia)
- Pentesting (pentesting)
- Cybersecurity - Means of enciphering
- Cryptography
- VPN - Virtual private networks
- Security incident management: problems and their solutions
- Authentication systems
- Law on personal data No. 152-FZ
- Personal data protection in the European Union and the USA
- Quotations of user data in the market of cybercriminals
- Jackpotting
- Virus racketeer (encoder)
- WannaCry (virus racketeer)
- Petya/ExPetr/GoldenEye (virus racketeer)
- Malware (malware)
- APT - Targeted or target attacks
- DDoS and DeOS
- Attacks on DNS servers
- DoS-attacks on content delivery networks, CDN Content Delivery Network
- How to be protected from DDoS attack. TADetails
- Rootkit
- Fraud Detection System (fraud, fraud, fraud detection system)
- Solutions Antifraud directory and projects
- How to select an antifraud system for bank? TADetails
- Security Information and Event Management (SIEM)
- Directory of SIEM solutions and projects
- Than a SIEM system is useful and how to implement it?
- For what the SIEM system is necessary and as it to implement TADetails
- Intrusion detection and prevention systems
- Reflections of local threats (HIPS)
- Confidential information protection from internal threats (IPC)
- Phishing, DMARC, SMTP
- Trojan
- Botha's botnet
- Backdoor
- Worms Stuxnet Regin
- Flood
- Information loss preventions (DLP)
- Skimming (shimming)
- Spam
- Sound attacks
- Antispam software solutions
- Classical file infectors
- Antiviruses
- Cybersecurity: means of protecting
- Backup system
- Backup system (technologies)
- Backup system (security)
- Firewalls