Reverse Engineering Mac Malware 2 - Mach-O BinariesThe focus of this part of Sarah Edwards’ presentation is entirely on Mach-O binaries. In particular,
the highlighted aspects include properties of these Mac OS X files, characteristics
of universal/fat binaries, file signatures and code signed binaries.
Furthermore, binary analysis using commands and such tools as MachOView and Hopper is graphically
illustrated to give you a better idea of the capabilities and features provided
by these apps.
Source:
Reverse Engineering Mac Malware 2 - Mach-O Binaries