iOS逆向

iOS逆向开发之otool汇总

2019-01-09  本文已影响13人  初xin工作室

iOS逆向开放之otool汇总

1、在终端输入:otool

返回如下:

-f print the fat headers-a print the archive header

-h print the mach header-l print the load commands

-L print shared libraries used

-D print shared library id name

-t print the text section (disassemble with -v)

-p <routine name>  start dissassemble from routine name

-s <segname> <sectname> print contents of section-d print the data section

-o print the Objective-C segment-r print the relocation entries

-S print the table of contents of a library

-T print the table of contents of a dynamic shared library

-M print the module table of a dynamic shared library

-R print the reference table of a dynamic shared library

-I print the indirect symbol table-

H print the two-level hints table

-G print the data in code table

-v print verbosely (symbolically) when possible

-V print disassembled operands symbolically

-c print argument strings of a core file

-X print no leading addresses or headers

-m don't use archive(member) syntax

-B force Thumb disassembly (ARM objects only)

-q use llvm's disassembler (the default)

-Q use otool(1)'s disassembler-mcpu=arg use `arg' as the cpu for disassembly

-j print opcode bytes-P print the info plist section as strings

-C print linker optimization hints--version print the version of

/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/otool

2、otool -l ex {Mach-O}

查看系统库、支持的架构信息及版本号

3、otool -tV {Mach-O}

查看ARM汇编码

4、otool -l {Mach-O} | grep -B 2 crypt

查看是否砸壳,cryptid 0(砸壳) 1(未砸壳)

5、otool -h {Mach-O}

查看Mach-O头结构

上一篇 下一篇

猜你喜欢

热点阅读