Objective-C Calling Conventions for iOS Reverse Engineering

  Рет қаралды 10,918

LaurieWired

LaurieWired

Күн бұрын

In this video, we learn how to follow Objective-C calling conventions for iOS Reverse Engineering and see how the Objective-C runtime uses message passing to invoke functions.
---
Timestamps:
00:00 Intro
00:44 Message Passing
01:23 Example IPA
01:59 blurBottomBgView
02:39 objc_msgSend
04:27 Method Selector Colons
06:30 ID Types
08:10 Method Invocation Madness
09:15 _objc_release() calls
10:19 UIBlurEffect Class
11:43 Source code of Method
12:27 Developer Method Names Trick!
14:30 Recap
---
Links Mentioned in Video:
Ghidra:
ghidra-sre.org/
objc_msgSend:
developer.apple.com/documenta...
LCActionSheet Class:
github.com/iTofu/LCActionShee...
---
Malware Examined in the video (goontact):
sha256:712e780afe2f0c4ccd0aa110d57c300d669bff4b5912ef9316b644a4ddbb6183
---
laurieWIRED Twitter:
/ lauriewired
laurieWIRED Website:
lauriewired.com
laurieWIRED Github:
github.com/LaurieWired
laurieWIRED HN:
news.ycombinator.com/user?id=...
laurieWIRED Reddit:
/ lauriewired

Пікірлер: 13
@TarasZakharchenko
@TarasZakharchenko 3 ай бұрын
Just spotted your channel. It is AWESOME! I cannot understand why you having just 20K subs. Here is everything: Lain IRL, low level staff I a fond of, cybersec insights which are useful for me as dev.
@graham-moss
@graham-moss 9 ай бұрын
Your videos are so well done. I'd be really interested to know what your production process is.
@fionnlanghans
@fionnlanghans 9 ай бұрын
Serial Experiments Lain is cool. Also, I learned something.
@shriokei
@shriokei 7 ай бұрын
learned something, I really like this channel! and her voice is so chill 🌐
@knobbymcfeck
@knobbymcfeck 9 ай бұрын
This is such a neat video format, thank you so much!
@saintswolfgang_
@saintswolfgang_ 9 ай бұрын
I love your website. it's cute and quirky, especially with the music.
@muxerous
@muxerous 9 ай бұрын
Your channel is a treasure and a masterpiece❤
@exalted1ne
@exalted1ne 9 ай бұрын
How well do you normally need to know each programming language or does it all sort of end up looking the same from Ghidra and you can just navigate regardless of the language?
@ganeshkumargopinathan6375
@ganeshkumargopinathan6375 9 ай бұрын
Good one Laurie! Please do more videos on macos malware
@giuseppesec
@giuseppesec 9 ай бұрын
at defcon rn and cant wait to see your talk. also more objc vids?
@lauriewired
@lauriewired 9 ай бұрын
More to come!
@jetstreamsham4968
@jetstreamsham4968 7 ай бұрын
How'd you do the voice thing at the beginning?
The Magic of RISC-V Vector Processing
16:56
LaurieWired
Рет қаралды 67 М.
everything is open source if you can reverse engineer (try it RIGHT NOW!)
13:56
Low Level Learning
Рет қаралды 1,2 МЛН
SHE WANTED CHIPS, BUT SHE GOT CARROTS 🤣🥕
00:19
OKUNJATA
Рет қаралды 15 МЛН
Sprinting with More and More Money
00:29
MrBeast
Рет қаралды 32 МЛН
小路飞姐姐居然让路飞小路飞都消失了#海贼王  #路飞
00:47
路飞与唐舞桐
Рет қаралды 94 МЛН
A Competition for Unreadable Code?
12:33
LaurieWired
Рет қаралды 132 М.
Swift in 100 Seconds
2:25
Fireship
Рет қаралды 717 М.
Software Reverse Engineering with Ghidra
31:08
CAE in Cybersecurity Community
Рет қаралды 11 М.
Hooking Java Methods with Frida
29:04
LaurieWired
Рет қаралды 14 М.
Ghidra Scripting to Speed Up Reverse Engineering
17:24
LaurieWired
Рет қаралды 14 М.
Dynamically Analyzing Linux Black Basta Ransomware
24:33
LaurieWired
Рет қаралды 17 М.
Using Strace to Trace Linux Syscalls
16:20
LaurieWired
Рет қаралды 12 М.
Learn Reverse Engineering (for hacking games)
7:26
cazz
Рет қаралды 964 М.
Cybersecurity "Experts" suck at coding.  It's a problem.
15:12
LaurieWired
Рет қаралды 94 М.
Triggering Android Intents
17:01
LaurieWired
Рет қаралды 4,2 М.
ПК с Авито за 3000р
0:58
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 1,5 МЛН
ПРОБЛЕМА МЕХАНИЧЕСКИХ КЛАВИАТУР!🤬
0:59
Корнеич
Рет қаралды 3,4 МЛН
Эффект Карбонаро и бумажный телефон
1:01
История одного вокалиста
Рет қаралды 2,6 МЛН
Carregando telefone com carregador cortado
1:01
Andcarli
Рет қаралды 1,9 МЛН
5 НЕЛЕГАЛЬНЫХ гаджетов, за которые вас посадят
0:59
Кибер Андерсон
Рет қаралды 710 М.