Wednesday, July 5, 2023
HomeProgrammingSuperior Apple Debugging & Reverse Engineering

Superior Apple Debugging & Reverse Engineering


This part tells you a couple of issues it’s good to know earlier than you get began, reminiscent of what you’ll want for {hardware} and software program, the place to seek out the undertaking information for this guide, and extra.

This part will cowl the fundamentals of utilizing LLDB, Apple’s software program debugger. You’ll discover an utility named Alerts, an Goal-C/Swift utility that illustrates how Unix alerts may be processed inside an utility. You’ll be taught some methods to seek out and create Swift syntax-style breakpoints in addition to Goal-C fashion breakpoints. By the tip of this part, you’ll be capable of wield the debugger to carry out a lot of the fundamental duties wanted for debugging, in addition to create your personal easy customized instructions.

On this chapter, you’re going to get acquainted with LLDB and examine the method of introspecting and debugging a program. You’ll begin off by introspecting a program you didn’t even write — Xcode!

Identical to any respectable developer device, LLDB ships with a wholesome quantity of documentation. Realizing methods to navigate via this documentation — together with among the extra obscure command flags — is important to mastering LLDB.

Now that you’ve got realized in regards to the two most important instructions, assist and apropos, it is time to examine all of the methods LLDB can connect itself to a course of.

Whether or not you’re utilizing Swift, Goal-C, C++, C, or a wholly totally different language in your expertise stack, you’ll have to discover ways to create breakpoints. It’s straightforward to click on on the aspect panel in Xcode to create a breakpoint utilizing the GUI, however the LLDB console can provide you rather more management over breakpoints.

Learn to question and manipulate the software program you’re debugging. On this chapter, you’ll be taught in regards to the **`expression`** command, which lets you question variables and execute arbitrary code.

You’ve realized methods to create breakpoints, methods to print and modify values, in addition to methods to execute code whereas paused within the debugger. However up to now you’ve been left excessive and dry on methods to transfer round within the debugger and examine information past the instant. On this chapter, you’ll discover ways to transfer the debugger out and in of code whereas `lldb` has suspended a program.

It is time to discover the most effective instruments for locating code of curiosity via the powers of lldb. On this chapter, you may take a deep dive into the picture command.

Be taught a gorgeous various to creating breakpoints by monitoring reads or writes to reminiscence.

On this chapter, you’ll discover ways to create easy, customized instructions after which persist them for utilizing each time you launch `lldb`.

On this chapter, you’ll discover ways to create instructions that may take inputs.

Realizing what the pc is doing with all these 1s and 0s beneath your code is a superb talent to have when digging for helpful details about a program. This part will set you up with the speculation you’ll want for the rest of this guide with a view to create complicated debugging scripts — and introduce you to the essential concept behind reverse-engineering code.

Now you’ve gained a fundamental understanding of methods to maneuver across the debugger, it’s time to take a step down the executable Jenga tower and discover the 1s and 0s that make up your supply code. This part will give attention to the low-level elements of debugging.

On this chapter, you’ll discover how a program executes. You’ll have a look at a particular register used to inform the processor the place it ought to learn the subsequent instruction from, in addition to how totally different sizes and groupings of reminiscence can produce very totally different outcomes.

What does being “handed on the stack” imply precisely? It’s time to take a deeper dive into what occurs when a perform is named from an meeting standpoint by exploring some “stack associated” registers in addition to the contents within the stack.

With a basis of assembler concept solidly beneath you, it’s time to discover different elements of how applications work. This part is an eclectic grab-bag of bizarre and enjoyable research into reverse engineering, seldom-used APIs and debugging methods.

On this chapter, you’ll study a particular API that allows debugging and even disables different processes from debugging the calling course of.

Shared libraries are important for any program to run. This chapter focuses on the compilation and linking course of, highlighting methods to write code that makes use of private and non-private APIs.

It’s time to be taught in regards to the complementary expertise of creating with these frameworks. On this chapter, you’re going to study strategies and methods to “hook” into Swift and C code in addition to execute strategies you wouldn’t usually have entry to.

The file format used for a compiled program working on any Apple {hardware}. This chapter discusses methods to learn this info.

Now that you’ve got realized the speculation, it is time to have some enjoyable. Learn to seek for curse phrases in Apple frameworks and cheat at playing video games.

This chapter provides you with a fundamental overview of how code signing works by having you choose aside an iOS utility and discover ways to re-sign and set up it onto your iOS system.

You’ve realized the essential LLDB instructions, the meeting that goes into code and the miscellaneous low-level ideas that make a program…nicely, a program.

It’s time to place that information collectively to create some very highly effective and sophisticated debugging scripts. As you’ll quickly see, you’re solely restricted by your talent and creativeness — and discovering the proper class (or header file) to do your debugging bidding.

LLDB ships with an built-in Python module that lets you entry most elements of the debugger via Python. This allows you to leverage all the ability of Python (and its modules) to assist uncover no matter darkish secrets and techniques vex you.

Subsequent up within the tradeoff between comfort and complexity is LLDB’s script bridging. With script bridging, you are able to do almost something you want. Script bridging is a Python interface LLDB makes use of to assist lengthen the debugger to perform your wildest debugging desires.

You want a methodical manner to determine what went mistaken in your LLDB script so that you don’t pull your hair out. On this chapter, you’ll discover methods to examine your LLDB Python scripts utilizing the Python pdb module, which is used for debugging Python scripts.

You’ve realized the necessities of working with LLDB’s Python module, in addition to methods to right any errors utilizing Python’s PDB debugging module. Now you’ll discover the primary gamers throughout the lldb Python module for an excellent overview of the primary elements. On this chapter, you’ll add some arguments to this script and cope with some annoying edge circumstances, such dealing with instructions in another way between Goal-C and Swift.

If you’re making a customized debugging command, you’ll usually wish to barely tweak performance primarily based upon choices or arguments provided to your command. A customized LLDB command that may do a job just one manner is a boring one-trick pony. On this chapter, you’ll discover methods to cross elective parameters (aka choices) in addition to arguments (parameters that are anticipated) to your customized command to change performance or logic in your customized LLDB scripts.

Up to now, when evaluating JIT code (i.e. Goal-C, Swift, C, and many others. code that’s executed via your Python script), you’ve used a small set of APIs to guage the code. It’s time to speak a couple of new class within the lldb Python module, SBValue, and the way it can simplify the parsing of JIT code output.

For the remainder of the chapters on this part, you may give attention to Python scripts. As alluded to within the earlier chapter, the picture lookup -rn command is on its manner out. If you end this chapter, you’ll have a brand new script named “lookup” which queries in a a lot cleaner manner.

When LLDB comes up towards a stripped executable (an executable devoid of DWARF
debugging info), LLDB received’t have the image info to provide the stack hint. As a substitute, LLDB will generate an artificial title for a technique it acknowledges as a technique, however doesn’t know what to name it. On this chapter, you’ll construct an LLDB script that may resymbolicate stripped Goal-C features in a stack hint.

For the ultimate chapter on this part, you’ll undergo the identical steps I actually took to grasp how the MallocStackLogging setting variable is used to get the stack hint when an object is created. From there, you’ll create a customized LLDB command which provides you the stack hint of when an object was allotted or deallocated in reminiscence — even after the stack hint is lengthy gone from the debugger.

What? Youve by no means heard of DTrace?! It’s AWESOME! DTrace is a device that allows you to discover code in dynamic & static methods.

http://dtrace.org/information/preface.html

You possibly can create DTrace probes to be compiled into your code (static), or you’ll be able to examine any code that’s already compiled and working (dynamic). DTrace is a flexible device: it may be a profiler, an analyzer, a debugger or something you need.

I usually will use DTrace to solid a wide-reaching web over code I wish to discover, when I’ve no clue the place I ought to begin.

You’ll discover a really small part of what DTrace is able to doing by tracing Goal-C code in already compiled functions. Utilizing DTrace to watch iOS frameworks (like UIKit) can provide you an unbelievable perception into how the authors designed their code.

This chapter will act as a grab-bag of extra DTrace fundamentals, harmful actions (yay!), in addition to methods to use DTrace with Swift. On this chapter, you may be taught further methods DTrace can profile code, in addition to methods to increase current code with out laying a finger on the precise executable itself.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments