Objective-C Calling Conventions for iOS Reverse Engineering
In this video, we learn how to follow Objective-C calling conventions for iOS Reverse Engineering and see how the Objective-C runtime uses message passing to invoke functions. --- Timestamps: 00:00 Intro 00:44 Message Passing 01:23 Example IPA 01:59 blurBottomBgView 02:39 objc_msgSend 04:27 Method Selector Colons 06:30 ID Types 08:10 Method Invocation Madness 09:15 _objc_release() calls 10:19 UIBlurEffect Class 11:43 Source code of Method 12:27 Developer Method Names Trick! 14:30 Recap --- Links Mentioned in Video: Ghidra: https://ghidra-sre.org/ objc_msgSend: https://developer.apple.com/documentation/objectivec/1456712-objc_msgsend LCActionSheet Class: https://github.com/iTofu/LCActionSheet/blob/master/LCActionSheet/Classes/LCActionSheet.m --- Malware Examined in the video (goontact): sha256:712e780afe2f0c4ccd0aa110d57c300d669bff4b5912ef9316b644a4ddbb6183 --- laurieWIRED Twitter: https://twitter.com/lauriewired laurieWIRED Website: http://lauriewired.com laurieWIRED Github: https://github.com/LaurieWired laurieWIRED HN: https://news.ycombinator.com/user?id=lauriewired laurieWIRED Reddit: https://www.reddit.com/user/LaurieWired
Download
0 formatsNo download links available.