Theories
After you have learned the basic concepts of iOS reverse engineering from part 1 and then
have tried tools mentioned in part 2 by yourself, you now are equipped with the fundamental
knowledge of iOS reverse engineering. Once you’ve completed all previous examples in the
book, you may be frustrated because you don’t know what to do next. Actually, learning
reverse engineering is a process of getting our hands dirty, but where and how to do that?
Luckily, there are some good patterns for us to follow. In chapter 5 and 6, we will start from the
perspective of Objective-C and ARM respectively, combine unique theories in iOS reverse
engineering with tools we’ve mentioned before, then summarize a universal methodology of
iOS reverse engineering. Let’s get started!
III