Using otool we can get general info about the Mach-O file:
otool -h [app_name]
> Mach header
magic cputype cpusubtype caps filetype ncmds sizeofcmds flags
0xfeedfacf 16777228 0 0x00 2 115 11384 0x00218085
Quick refernce on the meaning:
32-bit (ARMv6, ARMv7) – 0xFEEDFACE
64-bit – 0xFEEDFACF
Universal binaries – 0xCAFEBABE
nm WindTail/Final_Presentation.app/Contents/MacOS/usrnode - view the APIs used.
SMLoginItemSetEnabled - Wardle, Patrick. The Art of Mac Malware (p. 25). No Starch Press. Kindle Edition.
This one is particularly tiresome to reverse. Some advice:
When compiled are huge in size.
This is about … .
In this article I’m assembling information about debugging applications on Android, then all possible to anti-debugging techniques and how they can be curcumvented (a little spoiler here - almoust always one way 😀) . The question I am trying to find an answer to is whether there is a silver bullet 🔫 for anti-debugging or not.
Some symbol definitions:
⚠️ An important note from the forensics prospective.
⛏ How to circumvent this anti-debugging technique?