This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package org.mapleir; | |
import org.mapleir.app.client.SimpleApplicationContext; | |
import org.mapleir.app.service.ApplicationClassSource; | |
import org.mapleir.app.service.InstalledRuntimeClassSource; | |
import org.mapleir.asm.ClassHelper; | |
import org.mapleir.asm.ClassNode; | |
import org.mapleir.asm.MethodNode; | |
import org.mapleir.context.AnalysisContext; | |
import org.mapleir.context.BasicAnalysisContext; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# should works on any cloud-init enabled hypervisor (openstack.. ) | |
# start from a normal ubuntu 20.04 install as minimal was not available for ARM64 | |
# Since ARM64 machines has higher RAM, Shrinking is desired but not necessary. Instead we will increase tmpfs to 1700MB | |
# Getting root (if sudo -i doesn't work then set a root password beforehand using 'sudo passwd root' | |
sudo -i | |
# make sure we are on the highest kernel, so we can delete all the others ... |
This brief tutorial will show you how to go about analyzing a raw binary firmware image in Ghidra.
I was recently interested in reversing some older Cisco IOS images. Those images come in the form of a single binary blob, without any sort of ELF, Mach-o, or PE header to describe the binary.
While I am using Cisco IOS Images in this example, the same process should apply to other Raw Binary Firmware Images.