Переглядів 8,204
In this video we extract the components of an iOS application and learn how to find the entrypoint in Ghidra to start reverse engineering.
---
Timestamps:
00:00 Intro
00:33 Grabbing Sample
01:41 Don't Dump the whole thing!
02:29 Info.plist
03:40 Mach-O Binary
04:44 Ghidra Analysis
06:53 Entry Point
07:33 Finding Strings
07:49 Recap
---
Links Mentioned in Video:
Ghidra:
ghidra-sre.org/
---
Malware Examined in the video (goontact):
sha256:712e780afe2f0c4ccd0aa110d57c300d669bff4b5912ef9316b644a4ddbb6183
MalwareBazaar Link:
bazaar.abuse.ch/sample/712e78...
---
laurieWIRED Twitter:
/ lauriewired
laurieWIRED Website:
lauriewired.com
laurieWIRED Github:
github.com/LaurieWired
laurieWIRED HN:
news.ycombinator.com/user?id=...
laurieWIRED Reddit:
/ lauriewired