Microsoft Word - iOSAppReverseEngineering.docx

(Romina) #1

Figure 6- 10 Mail


Figure 6- 11 MobilePhoneSettings


Facing such demands, class-dump is quite helpless. Luckily, we have already learned how to


use Cycript, IDA and LLDB, and gained some basic knowledge about ARM assembly; with their


help, there are patterns to follow for “locate target functions”. For most of us, among all iOS


software, we know Apps the best, so if we’re to choose something as our junior reverse targets,

Free download pdf