In this video, we demangle Swift symbols for reverse engineering an iOS binary. I demonstrate how you can demangle identifiers by hand, via the command line, or even with a custom Ghidra script!
Timestamps:
00:00 Intro
01:18 Control Flow Flattening
02:30 Manual Decode
05:06 Automated Decode
08:18 Custom Ghidra Script
09:46 Demangle all the symbols!
10:49 Walking through the code
11:42 Swift vs Objective C
12:16 Recap
Links Mentioned in Video:
iOS Reverse Engineering Wiki:
https://github.com/LaurieWired/iOS_Re...
Swift Downloads:
https://www.swift.org/download/
laurieWIRED Twitter:
/ lauriewired
laurieWIRED Website:
http://lauriewired.com
laurieWIRED Github:
https://github.com/LaurieWired
laurieWIRED HN:
https://news.ycombinator.com/user?id=...
laurieWIRED Reddit:
/ lauriewired