Microsoft Word - iOSAppReverseEngineering.docx

(Romina) #1

Practices


The first 3 parts of this book have introduced the concepts, tools and theories of iOS reverse


engineering, along with examples to give you a better understanding of them. I believe you


have the same feeling that only if concepts, tools and theories are combined together can we get


the best out reverse engineering.


So far, you may still feel unsatisfied with the fragmented and conservative examples. So in


this part, we’ve prepared 4 original and serialized examples to show you the combination of


concepts, tools and theories. They are:



  • Characount for Notes 8

  • Mark user specific emails as read automatically^

  • Save and share Sight in WeChat
    -^ Detect and send iMessage


Now, welcome to the most splendid part of this book. Let’s enjoy the art of iOS reverse


engineering!


IV

Free download pdf