Greetings everyone! I've explained the situation below
2024-3-22 22:18:21 Author: www.reddit.com(查看原文) 阅读量:10 收藏

I'm using Ghidra to reverse engineer a particular application called Mirth (v4.4.1) which had a command injection vulnerability. I have the reference which tells me the problematic part of the code. The challenge I face is, when I push the Mirth exe file (supposed to be built with java) on Ghidra, it shows up as a C++ construction apart from the assembly language. I'm trying to locate that exact code in the exe file which I can make an anatomy on. Can you tell me how can I do this? I'm stuck because of translation.

One point I found out is that, I somehow need to push the jar file instead of the exe, but I have just the exe file.


文章来源: https://www.reddit.com/r/ReverseEngineering/comments/1bl0ciu/greetings_everyone_ive_explained_the_situation/
如有侵权请联系:admin#unsafe.sh