flat assembler
Message board for the users of flat assembler.
![]() |
Author |
|
a 16 Jun 2025, 09:38
prino wrote: so that I can use IDA/GHIDRA to extract it? Holy shit, I just googled GHIDRA and apparently it is debugger made by NSA, it surprised me that they made it public. Well I know that a lot of US goverment projects (like google and tor browser) was already created + made public but damn, NSA releasing their debugger is new to me |
|||
![]() |
|
Core i7 17 Jun 2025, 06:02
prino wrote: or even an .exe that contains this code, so that I can use IDA/GHIDRA to extract it? Why such complications? There are examples of implementation, I think it will be possible to rewrite it in asm: https://github.com/PeterScott/murmur3 |
|||
![]() |
|
Core i7 17 Jun 2025, 07:11
a wrote: Holy shit, I just googled GHIDRA and apparently it is debugger made by NSA,it surprised me that they made it public. Yes, Ghidra transmits some data from the user's machine to the NSA server - this is a proven fact. To catch this "scoundrel", you can run a network sniffer, for example Wireshark, and, having found out the server address/port, block it with a firewall. Or just always run it offline. |
|||
![]() |
|
revolution 17 Jun 2025, 07:31
IMO, it is better to block all applications by default from any network access, and use a whitelist to allow application you need and trust.
|
|||
![]() |
|
Furs 17 Jun 2025, 15:38
revolution wrote: IMO, it is better to block all applications by default from any network access, and use a whitelist to allow application you need and trust. |
|||
![]() |
|
Core i7 17 Jun 2025, 16:11
Wireshark even shows the content of the traffic, so we can find out what exactly is going from the machine to the enemy server. And blocking everything is a bad idea in my opinion, because "honest" software can go to its server to get, for example, updates.
|
|||
![]() |
|
revolution 17 Jun 2025, 22:47
Automatic updates are a curse, and should be outlawed.
|
|||
![]() |
|
< Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2025, Tomasz Grysztar. Also on GitHub, YouTube.
Website powered by rwasa.