This is a re-write of another Ghidra FindCrypt script as an auto analysis module. It also takes better advantage of the Ghidra API to label found constants.
FindCrypt builds like a standard Ghidra module:
cd FindCrypt
GHIDRA_INSTALL_DIR=/path/to/Ghidra_PUBLIC... gradle
This will output a zip in the FindCrypt/dist/
directory.
Note: Ghidra FindCrypt no longer supports Ghidra versions prior to 9.2 as they lack the Gson JSON library.
You can either build it yourself (see above) or download a zip from the Github releases or GitLab releases
The extension can be installed into Ghidra like so:
- Extract the zip if downloaded from the release page
- From the Project window hit
File
->Install extensions...
- Click the green plus icon on the top right
- In the file browser that opens, select the zip. In case of the released zip the final zip is inside `FindCrypt/dist.
- Click OK and restart Ghidra
Once the script is installed, a new Analysis is added to the Auto Analyze window called "Find Crypt", it's enabled by default and it's safe to re-run. If you have an existing file, open the "Analysis" menu in the CodeBrowser tool and click "Auto Analyze". Select the "Find Crypt" analysis from the list and click Analyze.
Once the analysis is complete, any found crypt constants will be labeled with
the algorithm they're associated with. You can find these labels in the "Labels"
folder in the Symbol Tree window. The labels are prefixed with CRYPT_
to group
them together.
The analysis will also try to set the datatype for the found constants, but if a datatype has been applied by another analysis module that other module will take precedence.
A comment is always placed when a crypt constant is found to tell you the type and the size of the constant, just in case the datatype wasn't applied.