The market share for Apple devices has grown considerably over the past few years, but most reverse engineering topics still focus on Microsoft platforms. This talk will outline what is necessary to begin reversing software on OS X. This will include a rundown of the tools available to an apple based researcher, how Objective-C works and what it looks like in a binary, the basics of the Mach-O file format including the undocumented _OBJC section, comparisons of Windows applications and the OS X counterparts. Additionally some time will be taken to discuss the differences in the structure of binaries on the iPhone.
This talk should give attendees insight into what is involved in the analysis of OS X binaries on both Apple machines and iPhones for vulnerabilities and interoperability. Attendees will gain a solid understanding of how windows reversing skills can be quickly applied to OS X binaries, including the common tools and resources available for an Apple security researcher.