In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective in your reverse engineering workflows. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effectively.
The process of transforming source code into application binaries is a lossy process, but at least some of this data can be reincorporated into a Ghidra analysis by loading debug information. In fact, Microsoft maintains a repository of program database (PDB) files with debugging information about each published executable file. The PDB files generated when linking an application can be used to correlate particular instructions with source code file name and line numbers as well as to label variables and functions with symbolic names from the source. Although not strictly necessary for a successful analysis, loading a PDB file can greatly accelerate the reversing process by giving a glimpse into the authors’ thought process.
Ghidra helpfully provides functionality for identifying and downloading PDB files from a symbol server. Although initial releases of Ghidra required Windows, the release of version 9.2 in November 2020 has introduced a platform-independent PDB parser, thereby opening the doors for Linux and macOS users to easily analyze Windows components complete with symbol information. In this post, I will briefly recap the steps for using Ghidra to analyze a Windows binary with details loaded from Microsoft’s symbol server.
Being able to do this natively in Ghidra without a Windows computer is a big productivity boost for those of us who must occasionally dissect Windows binaries but who do not primarily use Windows as a native OS. It is really fantastic to see the Ghidra developers adding features that directly improve my workflow, and I can’t wait to see what’s in the pipeline for new features.
Without further introduction, here are the steps for identifying, downloading and applying Windows PDB files from Microsoft’s public symbol server. The steps were tested on macOS running Ghidra 9.2.2 via Amazon Corretto for JDK 11:
Step 1: Import a Windows executable or library into a Ghidra project.
Step 2: Open the program in CodeBrowser and select ‘No’ when asked to analyze the program.
Step 3: Select ‘Download PDB’ from the File menu
Step 4: Select ‘PDB’ when prompted to choose between PDB and XML
Step 5: The next prompt asks about using a search path specified in the executable. Select ‘No’ and then select a local folder where PDB files should be downloaded.
Step 6: Click ‘Choose from known URLs’ to select an appropriate download URL and click ‘Download from URL.’
Step 7: After a pop-up confirming the download success, select ‘Yes’ to apply the PDB.
Step 8: Confirm the PDB load options by clicking ‘Apply.’
Step 9: Be patient while the symbols load. This can take a few minutes.
Step 10: Observe that the symbol tree has been populated with descriptive symbol names.
All available Ghidra views and plugins should now be integrated with the debugging information from the PDB.
NOTICE: These instructions were written for Ghidra 9.2.x. An updated post for loading symbols in Ghidra 10.x is coming soon.
Read More about Ghidra
Ghidra 101: Cursor Text Highlighting
Ghidra 101: Creating Structures in Ghidra
Ghidra 101: Decoding Stack Strings
Ghidra 101: Slice Highlighting
Ghidra 101: Loading Windows Symbols (PDB files) in Ghidra 10.x
Request a Live Demo
Experience the power of Tripwire's cybersecurity solutions firsthand! Take a guided tour or participate in live demos to see how our products can enhance your organization's security. Start exploring now