Taking Apart iOS Apps: Anti-Debugging and Anti-Tampering in the Wild

https://blog.calif.io/p/taking-apart-ios-apps-anti-debugging

#ios #reverseengineering #antidebug

Taking Apart iOS Apps: Anti-Debugging and Anti-Tampering in the Wild

Table Of Contents

Calif

In 2021, I wrote about section hashing, a popular anti debugging technique to detect software breakpoints.
https://malwareandstuff.com/catching-debuggers-with-section-hashing/

#malware #reverseengineering #cybersecurity #infosec #antidebug

Catching Debuggers with Section Hashing

As a Reverse Engineer, you will always have to deal with various anti analysis measures. The amount of possibilities to hamper our work is endless. Not only you will have to deal with code obfuscat…

Malware and Stuff

okay, this is my favorite goofy linux antidebug trick so far. catches gdb and lldb, and especially with a bit more obfuscation (e.g. mmap a *file* RW there, move the stack up a bunch so that it overlaps w/ the mmapped file, write to that file to corrupt your own stack, 😸 ) it can be, i think, pretty annoying to figure out

http://sprunge.us/J7gMI4

link *statically*
#antidebug #antidebugging

Came across a reference called "The 'Ultimate' Anti-Debugging Reference" by Peter Ferrie from 2011 yesterday.

Although dated, it contains some of the easiest to understand explanations to many anti-debugging techniques that I've seen so far.

The original link is down, but thankfully it's been archived and I'm a sucker for preservation, so I thought I'd share it here.

https://web.archive.org/web/20190608123534/http://pferrie.host22.com/papers/antidebug.pdf

#windows #antidebug #reference #reverseengineering

Is there a debugger I can "attach" by sideloading a DLL to the target? #antidebug #antiantidebug
Akkoma

Rewriting ntdll functions to bypass simple user-mode hooks (antidebug) https://secrary.com/Random/BypassUserHooks/ #windows #reverseengineering #antidebug https://t.co/8Tvz8KlFm5
Bypasss User-Mode Hooks

This blog is about malware analysis and reverse engineering. But Does it matter?

gsuberland/al-khaser

al-khaser - Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.