![]() There are efficient obfuscation techniques. On Windows, nowadays especially, reverse engineering is much harder. Reverse engineering software wasn’t really hard on Mac OS X. On Mac OS 10.4 (Tiger) we could do almost everything with GDB, otoole, otx, class-dump and so on. Back then Apple supported different architectures. ![]() Apple uses a different binary format, which is called Mach-o. I started reverse-engineering on Mac OS X. De-obfuscation and Anti Anti-analysis techniques - a necessary skill set on Windows Why is this necessary knowledge?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |