Hacker News new | past | comments | ask | show | jobs | submit login

It takes IDA Pro, some low level asm/C++/Python programming skills and a lot of hours.

Reverse engineering is not that complicated, however getting some results is difficult and time consuming.

In that example it's basically looking at how some libraries are parsing input, that's it. Since everything in those phones are C/C++ nothing is "safe".

It's the same skills you need to crack games, cheat in online games etc ...




It would be quite difficult if you can't get access to the binaries that you have to put into IDA (or, well, Ghidra, for that matter, but IDA Pro is probably better).


The binaries are available in OS restore images that Apple makes publicly available.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: