O'Reilly logo

Covert Java™: Techniques for Decompiling, Patching, and Reverse Engineering by Alex Kalinovsky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Cracking Code with Unorthodox Debuggers

 

“Any simple theory will be worded in the most complicated way.”

 
 --Murphy's Technology Laws

Understanding the Internals of Unknown Applications

Writing a chapter on using a conventional debugger is on the border of insulting the reader's intelligence. If you can't figure out how to use a debugger on your own, you probably should think of a career change. Rather, the focus of this chapter is on using an unorthodox tool that offers a different approach to looking inside the running applications. Even though I talk about ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required