GDB Debugging protections -
i trying reverse engineer cydia app (binary) , using gdb ida pro.
there seems debugging protection because main()
not in bt stack, , cannot access of functions, class-dump-z , ida pro both show functions clearly.
the last 2 entries in bt stack are:
_mh_execute_header<br> _mh_execute_header<br>
this main()
should be.
has seen these before?
from have read ptrace()
wouldn't let attach process let me. tried around sysctl()
don't think method has been used either.
does know else be?
also not have source files.
your question exceedingly unclear. asking?
main() not in bt stack,
that's quite common fully-stripped executables. if run nm a.out | grep main
, don't see main
, main
can't show in stack traces.
that alone not prove application using anti-debugging techniques.
Comments
Post a Comment