iOS Reverse Engineering Resources

http://samdmarshall.com/re.html

轉載地址:

http://blog.csdn.net/forlong401/article/details/23482619



Reverse Engineering Resources

Debugging

These are very important guides for understanding the debugging process and how applications work.

Mach-O Binaries

Mac OS X and iOS use Mach-O file format for executable binaries and shared libraries. It supports multiple architectures in one binary file (Universal or fat binaries).

Analysis

Guides and introductory material to binary analysis.

  • Analyzing Binaries with Hopper (link)

System ABIs

Calling conventions define how functions and subroutines receive the parameters passed to them from the calling function.

Language Resources

Language specific knowledge is often required to understand what is going on behind the scenes.

Further Reading

Collection of blogs and reading resources that give deep insight into how many aspects of languages and system functionality.

  • NSBlog (link)
  • Reverse Engineering Mac OS X (link)
  • Landon's Blog (link)
  • OS X Internals (link)
  • Greg Parker's Blog (link)
  • Ridiculous Fish (link)
  • Snare's Blog (link)
  • To The Apple's Core (link)
  • The Objective-C Runtime: Understanding and Abusing (link)

Tools

Mach-O Binary Analyzers:

Hex Editors:

Disassemblers:

Decompilers:

Debuggers:

Memory Editors:

Various Command Line Tools:

Useful Source Repositories:

  • Apple Source Code (link)
  • PLCrashReporter (link)
  • Mike Ash's Github (link)
  • Landon Fuller's Github (link)
  • Jonathan Rentzsch's Github (link)
  • fG!'s Github (link)
  • openjailbreak (link)
發佈了264 篇原創文章 · 獲贊 3 · 訪問量 34萬+
發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章