| 000 | 05140cam a22005297a 4500 | ||
|---|---|---|---|
| 001 | on1317324364 | ||
| 003 | OCoLC | ||
| 005 | 20241121073021.0 | ||
| 006 | m d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 220514s2022 enka o 000 0 eng d | ||
| 040 |
_aEBLCP _beng _epn _cEBLCP _dORMDA _dOCLCF _dOCLCQ _dN$T _dUKMGB _dOCLCQ _dIEEEE _dOCLCO |
||
| 015 |
_aGBC274167 _2bnb |
||
| 016 | 7 |
_a020566472 _2Uk |
|
| 020 | _a1801074909 | ||
| 020 |
_a9781801074902 _q(electronic bk.) |
||
| 020 | _z9781801073394 (pbk.) | ||
| 035 |
_a3270552 _b(N$T) |
||
| 035 | _a(OCoLC)1317324364 | ||
| 037 |
_a9781801073394 _bO'Reilly Media |
||
| 037 |
_a10163628 _bIEEE |
||
| 050 | 4 | _aQA76.76.A65 | |
| 082 | 0 | 4 |
_a005.1 _223/eng/20220602 |
| 049 | _aMAIN | ||
| 100 | 1 |
_aMishra, Abhinav. _919715 |
|
| 245 | 1 | 0 |
_aMobile App Reverse Engineering : _bGet Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps / _cAbhinav Mishra. |
| 260 |
_aBirmingham : _bPackt Publishing, Limited, _c2022. |
||
| 300 |
_a1 online resource (166 pages) : _bcolor illustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 588 | 0 | _aPrint version record. | |
| 520 | _aDelve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issues Key Features Learn the skills required to reverse engineer mobile applications Understand the internals of iOS and Android application binaries Explore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and more Book Description Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world's evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps. This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You'll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you'll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you'll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues. By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence. What you will learn Understand how to set up an environment to perform reverse engineering Discover how Android and iOS application packages are built Reverse engineer Android applications and understand their internals Reverse engineer iOS applications built using Objective C and Swift programming Understand real-world case studies of reverse engineering Automate reverse engineering to discover low-hanging vulnerabilities Understand reverse engineering and how its defense techniques are used in mobile applications Who this book is for This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required. | ||
| 505 | 0 | _aTable of Contents Basics of Reverse Engineering – Understanding the Structure of Mobile Apps Setting Up a Mobile App Reverse Engineering Environment Using Modern Tools Reverse Engineering an Android Application Reverse Engineering an iOS Application Reverse Engineering an iOS Application (Developed Using Swift) Open Source and Commercial Reverse Engineering Tools Automating the Reverse Engineering Process Conclusion. | |
| 590 | _aAdded to collection customer.56279.3 | ||
| 650 | 0 |
_aApplication software _xDevelopment. _91554 |
|
| 650 | 0 |
_aMobile apps _xTesting. _919716 |
|
| 650 | 0 |
_aApplication software _xTesting. _919717 |
|
| 650 | 6 |
_aLogiciels d'application _xD�eveloppement. _919016 |
|
| 650 | 7 |
_aApplication software _xDevelopment _2fast _91554 |
|
| 650 | 7 |
_aApplication software _xTesting _2fast _919717 |
|
| 776 | 0 | 8 |
_iPrint version: _aMishra, Abhinav. _tMobile App Reverse Engineering. _dBirmingham : Packt Publishing, Limited, �2022 |
| 856 | 4 | 0 |
_3EBSCOhost _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3270552 |
| 938 |
_aProQuest Ebook Central _bEBLB _nEBL6970217 |
||
| 938 |
_aEBSCOhost _bEBSC _n3270552 |
||
| 994 |
_a92 _bN$T |
||
| 999 |
_c8276 _d8276 |
||