Friday, July 21, 2023

Ghidra installation steps for macOS

Ghidra is a free and open-source software reverse engineering tool developed by the National Security Agency (NSA). It runs on multiple platforms, including macOS. Here are the installation steps for Ghidra on macOS:

  1. Download Ghidra: Visit the official Ghidra website (https://ghidra-sre.org/) and download the macOS version of Ghidra.
  2. Extract the downloaded archive: Once the download is complete, locate the downloaded archive (usually a .zip file), and double-click to extract it.
  3. Move Ghidra to a suitable location: After extraction, you'll find a directory named something like "ghidra_9.2.2_PUBLIC". You can move this directory to a location of your choice on your macOS system. For example, you can move it to the "Applications" folder for easier access.
  4. Set up the Java Development Kit (JDK): Ghidra requires Java to run. If you don't have Java Development Kit (JDK) installed on your system, you'll need to download and install it. Make sure you have at least Java 11 installed on your macOS.
  5. Run Ghidra: Open a terminal and navigate to the Ghidra directory you extracted earlier. Within that directory, you'll find a script named "ghidraRun" (or "ghidraRun.command"). Execute this script to start Ghidra.
cd /path/to/ghidra_9.2.2_PUBLIC ./ghidraRun

  • Set up initial configurations: When you run Ghidra for the first time, it will prompt you to set up some initial configurations, such as setting the JDK path. Follow the on-screen instructions to complete the setup.
  • Start using Ghidra: Once the setup is complete, Ghidra should launch successfully on your macOS. You can now start using Ghidra for software reverse engineering and analysis.

Please note that the version numbers mentioned above (e.g., "ghidra_9.2.2_PUBLIC") might be different, depending on the version of Ghidra available at the time of your installation. Always use the latest version from the official website.


Post by

newWorld





Operating system - Part 1:

 In our blog, we published several articles on OS concepts which mostly on the perspective for malware analysis/security research. In few in...