Главная
Study mode:
on
1
Intro
2
Motivation
3
How Does Swift Affect Testing?
4
What is Swift?
5
Syntax (just the basics to follow along)
6
Other Language Features
7
Challenges
8
Reversing Swift Apps
9
Class Dump?
10
Symbol Table
11
Name Mangling
12
Function Attributes
13
Return Types
14
swift-demangle
15
class-dump-s
16
Stripped Binaries
17
Objective-C Compatibility
18
Revisiting Class Dump
19
Other Options
20
Hooking Swift Methods
21
Wrap Up
22
Next Steps
Description:
Explore reverse engineering techniques for Swift applications in this comprehensive conference talk from HITB Security Conference. Delve into the Swift language from a security perspective, covering topics such as obtaining class information from Swift binaries, Objective-C/Swift bridging, Swift runtime manipulation, and function hooking. Learn about the challenges faced when reversing Swift apps, including symbol table analysis, name mangling, and working with stripped binaries. Gain insights into Objective-C compatibility and various methods for class dumping. Discover practical approaches to hooking Swift methods and understand the next steps in Swift application security testing.

Reverse Engineering Swift Applications

Hack In The Box Security Conference
Add to list