Mac下的私有API私有函数扫描
来源:互联网 发布:诺基亚n9刷机软件 编辑:程序博客网 时间:2024/06/01 11:54
Disassembling Private APIs on Mac OS X
There are several ways to reverse engineer private APIs on Mac OS X. For example, if you needed to know how a certain AppKit function was implemented, you could try some of the following.
To find APIs in a library:
To generate disassembly for an entire library:
Until I discovered otx I had to trace Objective-C using the si/ni commands in gdb to figure out what a function was doing.
To find APIs in a library:
nm -g /System/Library/Frameworks/AppKit.framework/AppKitTo generate headers of Objective-C classes in a library:
class-dump -H -o /AppKit_Headers /System/Library/Frameworks/AppKit.framework/AppKitTo view the disassembly of a function:
gdb /Applications/Calculator.app/Contents/MacOS/Calculator
break -[NSApplication run]
run
disas
To generate disassembly for an entire library:
otool -tV /System/Library/Frameworks/AppKit.framework/AppKitI've recently also started using otx. This works very similarly to otool but in addition it will annotate the assembly. The best part is that it will resolve Objective-C calls making it much easier to tell what a function is doing. Here's a sample output of otool (top) vs otx (bottom):
Until I discovered otx I had to trace Objective-C using the si/ni commands in gdb to figure out what a function was doing.
0 0
- Mac下的私有API私有函数扫描
- Mac下窥探私有API
- Mac下检测ios应用内是否有私有API
- Iphone的私有API
- 查看iOS/Mac 的私有API - 使用class-dump
- Python的私有函数
- 私有的构造函数
- 私有api
- 私有API
- 私有API
- 私有API
- [WebKit]遭遇Mac OS私有API
- IOS私有API的了解
- IOS私有API的了解
- iOS 私有api的调用
- ios私有API的使用
- IOS私有API的了解
- IOS私有API的了解
- 如何调试Suspend-Resume相关的Bug
- android中的Fragment
- proc文件系统解析
- 各种排序算法分析比较
- 设置属性
- Mac下的私有API私有函数扫描
- Head First: 观察者模式
- 一段适合新手的Java代码,阅读一定有收获。
- 广义线性模型2
- 英雄杀_商鞅变法
- mxGraph web 下IE设置图片节点显示,只需修改js代码
- 协方差矩阵、相关矩阵、相关系数矩阵、相关系数之间的关系
- Go语言 指针
- 一年级上学期总结以及规划