GDB Debugging protections -


i trying reverse engineer cydia app (binary) , using gdb ida pro.

there seems debugging protection because main() not in bt stack, , cannot access of functions, class-dump-z , ida pro both show functions clearly.

the last 2 entries in bt stack are:

_mh_execute_header<br> _mh_execute_header<br> 

this main() should be.

has seen these before?

from have read ptrace() wouldn't let attach process let me. tried around sysctl() don't think method has been used either.

does know else be?

also not have source files.

your question exceedingly unclear. asking?

main() not in bt stack,

that's quite common fully-stripped executables. if run nm a.out | grep main , don't see main, main can't show in stack traces.

that alone not prove application using anti-debugging techniques.


Comments

Popular posts from this blog

SPSS keyboard combination alters encoding -

Add new record to the table by click on the button in Microsoft Access -

CSS3 Transition to highlight new elements created in JQuery -