During forensics investigation it’s sometimes needed to reverse engineer some suspicious piece of code. This section is a reverse engineering dive-in section.
There are several indicators that the executable is packed. Here they are (this list will be growing as I encounter new indicators):
References Expand… [1] Mobile Sec Guide [2] Symbolic execution on iOS with R2Frida & ESILSolve