Skip to content

Conversation

cpholguera
Copy link
Collaborator

@cpholguera cpholguera commented May 28, 2025

This pull request adds a detailed guide on using Radare2 (r2) for static analysis of iOS applications in the MASTG-TECH-0066.md file. The guide focuses on identifying relevant functions, analyzing strings, inspecting disassembly, and finding cross-references to enhance reverse engineering capabilities.

This section aligns with the way we're currently using r2 in the MASTG demos.

  • Introduction to Radare2: Added an overview of Radare2 as a reverse engineering framework and instructions for using its visual mode for interactive analysis.

  • Identifying Relevant Functions:

    • Explained the use of the afl command for listing and filtering functions by name, with examples for cryptographic functions like SecKeyCreateRandomKey.
    • Provided alternative methods for locating dynamically resolved or obfuscated functions using flags (f), string searches (/, /z, iz~), and cross-references (axt).
  • Analyzing Strings: Detailed the use of iz and izz commands to list strings in the binary and / for direct string searches, with filtering options for precision.

  • Analyzing Cross-References: Added guidance on using the axt command to find cross-references to functions or strings, helping trace their usage in the

@cpholguera cpholguera self-assigned this May 29, 2025
@cpholguera cpholguera marked this pull request as draft June 8, 2025 06:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants