Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace

Por um escritor misterioso
Last updated 03 janeiro 2025
Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace
In this chapter, you'll use DTrace to hook objc_msgSend's entry probe and pull out the class name along with the Objective-C selector for that class. By the end of this chapter, you'll have LLDB generating a DTrace script which only generates tracing info for code implemented within the main executable that calls objc_msgSend.
Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace
iOS Hacking: Advanced Pentest & Forensic Techniques
Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace
Tampering and Reverse Engineering on iOS - OWASP MASTG
Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace
All The Quickies, Chronologically
Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace
Securing Your Fleet
Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace
FreeBSD Handbook FreeBSD Documentation Portal
Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace
Project Zero: An iOS zero-click radio proximity exploit odyssey
Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace
Mastering Reverse Engineering
Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace
Virus Bulletin :: VB2019 paper: Play fuzzing machine – hunting iOS/macOS kernel vulnerabilities automatically and smartly
Advanced Apple Debugging & Reverse Engineering, Chapter 31: DTrace
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak

© 2014-2025 immanuelipc.com. All rights reserved.