|
Showing 1 - 3 of
3 matches in All Departments
Delve into the world of mobile application reverse engineering,
learn the fundamentals of how mobile apps are created and their
internals, and analyze application binaries to find security issues
Key Features Learn the skills required to reverse engineer mobile
applications Understand the internals of iOS and Android
application binaries Explore modern reverse engineering tools such
as Ghidra, Radare2, Hopper, and more Book DescriptionMobile App
Reverse Engineering is a practical guide focused on helping
cybersecurity professionals scale up their mobile security skills.
With the IT world's evolution in mobile operating systems,
cybercriminals are increasingly focusing their efforts on mobile
devices. This book enables you to keep up by discovering security
issues through reverse engineering of mobile apps. This book starts
with the basics of reverse engineering and teaches you how to set
up an isolated virtual machine environment to perform reverse
engineering. You'll then learn about modern tools such as Ghidra
and Radare2 to perform reverse engineering on mobile apps as well
as understand how Android and iOS apps are developed. Next, you'll
explore different ways to reverse engineer some sample mobile apps
developed for this book. As you advance, you'll learn how reverse
engineering can help in penetration testing of Android and iOS apps
with the help of case studies. The concluding chapters will show
you how to automate the process of reverse engineering and
analyzing binaries to find low-hanging security issues. By the end
of this reverse engineering book, you'll have developed the skills
you need to be able to reverse engineer Android and iOS apps and
streamline the reverse engineering process with confidence. What
you will learn Understand how to set up an environment to perform
reverse engineering Discover how Android and iOS application
packages are built Reverse engineer Android applications and
understand their internals Reverse engineer iOS applications built
using Objective C and Swift programming Understand real-world case
studies of reverse engineering Automate reverse engineering to
discover low-hanging vulnerabilities Understand reverse engineering
and how its defense techniques are used in mobile applications Who
this book is forThis book is for cybersecurity professionals,
security analysts, mobile application security enthusiasts, and
penetration testers interested in understanding the internals of
iOS and Android apps through reverse engineering. Basic knowledge
of reverse engineering as well as an understanding of mobile
operating systems like iOS and Android and how mobile applications
work on them are required.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
Wonka
Timothee Chalamet
Blu-ray disc
R250
Discovery Miles 2 500
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.