![]() ![]() There are efficient obfuscation techniques. On Windows, nowadays especially, reverse engineering is much harder. Reverse engineering software wasn’t really hard on Mac OS X. ![]() On Mac OS 10.4 (Tiger) we could do almost everything with GDB, otoole, otx, class-dump and so on. Back then Apple supported different architectures. Apple uses a different binary format, which is called Mach-o. I started reverse-engineering on Mac OS X. De-obfuscation and Anti Anti-analysis techniques - a necessary skill set on Windows Why is this necessary knowledge? ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |