2023-08-17 –, Milliways
Language: English
A deep dive explaining the Mach-O executable format along side a code demo.
Apple systems can be quite obscure and archaic considering how popular and ubiquitous their devices are. Learning more about apple systems for any purpose therefore requires a healthy amount of reverse engineering. A core part of reverse engineering Apple systems is understanding the Mach-O file format which is how all Apple OSes describe executable files. This talk will provide an in depth explanation of the file format as well as a code example showing how we can parse Mach-O objects at runtime to show a loaded system libraries Obj-C class hierarchy.
A software engineer from Texas who works on the Intune MAM iOS SDK. Currently working on a Masters at UT Austin.