back

Demystify Mach-O

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:34:13
Language
English
Abstract
A deep dive explaining the Mach-O executable format along side a code demo.

Apple systems can be quite obscure and archaic considering how popular and ubiquitous their devices are. Learning more about apple systems for any purpose therefore requires a healthy amount of reverse engineering. A core part of reverse engineering Apple systems is understanding the Mach-O file format which is how all Apple OSes describe executable files. This talk will provide an in depth explanation of the file format as well as a code example showing how we can parse Mach-O objects at runtime to show a loaded system libraries Obj-C class hierarchy.

Talk ID
camp2023-57032
Event:
camp2023
Day
3
Room
Milliways
Start
9:30 a.m.
Duration
00:45:00
Track
Milliways
Type of
Talk
Speaker
Garrigan
Talk Slug & media link
camp2023-57032-demystify_mach_o
English
0.0% Checking done0.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
100.0% Nothing done yet100.0%
  

Work on this video on Amara!

English: Transcribed until

Last revision: 8 months, 3 weeks ago