Hi!
I’m pretty new to reverse engineering in general and even more so on IOS. I’ve tried to open a bunch of binaries in IDA(ghidra and hopper, too) but all I’m getting is obfuscated stuff. My IPAs are cracked, so it’s not encrypted. However, it created TONS of functions with redundant names, such as FUNC_X or sub_X. How do you deal with that? Reading obfuscated java code is easy, but in assembly? Not even a single symbol can be recognized, unlike in java where, say, the file class is used to read something, so despite obfuscation you know what its doing. Here, everything leads to a call of another FUNc_X, which leads to another....
Since some of thoses game already have hacks on here, I figured its possible