000 05140cam a22005297a 4500
001 on1317324364
003 OCoLC
005 20241121073021.0
006 m d
007 cr cnu---unuuu
008 220514s2022 enka o 000 0 eng d
040 _aEBLCP
_beng
_epn
_cEBLCP
_dORMDA
_dOCLCF
_dOCLCQ
_dN$T
_dUKMGB
_dOCLCQ
_dIEEEE
_dOCLCO
015 _aGBC274167
_2bnb
016 7 _a020566472
_2Uk
020 _a1801074909
020 _a9781801074902
_q(electronic bk.)
020 _z9781801073394 (pbk.)
035 _a3270552
_b(N$T)
035 _a(OCoLC)1317324364
037 _a9781801073394
_bO'Reilly Media
037 _a10163628
_bIEEE
050 4 _aQA76.76.A65
082 0 4 _a005.1
_223/eng/20220602
049 _aMAIN
100 1 _aMishra, Abhinav.
_919715
245 1 0 _aMobile App Reverse Engineering :
_bGet Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps /
_cAbhinav Mishra.
260 _aBirmingham :
_bPackt Publishing, Limited,
_c2022.
300 _a1 online resource (166 pages) :
_bcolor illustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 0 _aPrint version record.
520 _aDelve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issues Key Features Learn the skills required to reverse engineer mobile applications Understand the internals of iOS and Android application binaries Explore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and more Book Description Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world's evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps. This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You'll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you'll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you'll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues. By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence. What you will learn Understand how to set up an environment to perform reverse engineering Discover how Android and iOS application packages are built Reverse engineer Android applications and understand their internals Reverse engineer iOS applications built using Objective C and Swift programming Understand real-world case studies of reverse engineering Automate reverse engineering to discover low-hanging vulnerabilities Understand reverse engineering and how its defense techniques are used in mobile applications Who this book is for This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required.
505 0 _aTable of Contents Basics of Reverse Engineering – Understanding the Structure of Mobile Apps Setting Up a Mobile App Reverse Engineering Environment Using Modern Tools Reverse Engineering an Android Application Reverse Engineering an iOS Application Reverse Engineering an iOS Application (Developed Using Swift) Open Source and Commercial Reverse Engineering Tools Automating the Reverse Engineering Process Conclusion.
590 _aAdded to collection customer.56279.3
650 0 _aApplication software
_xDevelopment.
_91554
650 0 _aMobile apps
_xTesting.
_919716
650 0 _aApplication software
_xTesting.
_919717
650 6 _aLogiciels d'application
_xD�eveloppement.
_919016
650 7 _aApplication software
_xDevelopment
_2fast
_91554
650 7 _aApplication software
_xTesting
_2fast
_919717
776 0 8 _iPrint version:
_aMishra, Abhinav.
_tMobile App Reverse Engineering.
_dBirmingham : Packt Publishing, Limited, �2022
856 4 0 _3EBSCOhost
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3270552
938 _aProQuest Ebook Central
_bEBLB
_nEBL6970217
938 _aEBSCOhost
_bEBSC
_n3270552
994 _a92
_bN$T
999 _c8276
_d8276