Taking Apart iOS Apps: Anti-Debugging and Anti-Tampering in the Wild
https://blog.calif.io/p/taking-apart-ios-apps-anti-debugging
Taking Apart iOS Apps: Anti-Debugging and Anti-Tampering in the Wild
https://blog.calif.io/p/taking-apart-ios-apps-anti-debugging
In 2021, I wrote about section hashing, a popular anti debugging technique to detect software breakpoints.
https://malwareandstuff.com/catching-debuggers-with-section-hashing/
#malware #reverseengineering #cybersecurity #infosec #antidebug
okay, this is my favorite goofy linux antidebug trick so far. catches gdb and lldb, and especially with a bit more obfuscation (e.g. mmap a *file* RW there, move the stack up a bunch so that it overlaps w/ the mmapped file, write to that file to corrupt your own stack, 😸 ) it can be, i think, pretty annoying to figure out
link *statically*
#antidebug #antidebugging
Came across a reference called "The 'Ultimate' Anti-Debugging Reference" by Peter Ferrie from 2011 yesterday.
Although dated, it contains some of the easiest to understand explanations to many anti-debugging techniques that I've seen so far.
The original link is down, but thankfully it's been archived and I'm a sucker for preservation, so I thought I'd share it here.
https://web.archive.org/web/20190608123534/http://pferrie.host22.com/papers/antidebug.pdf