Microsoft Word - iOSAppReverseEngineering.docx

(Romina) #1

Theories


After you have learned the basic concepts of iOS reverse engineering from part 1 and then


have tried tools mentioned in part 2 by yourself, you now are equipped with the fundamental


knowledge of iOS reverse engineering. Once you’ve completed all previous examples in the


book, you may be frustrated because you don’t know what to do next. Actually, learning


reverse engineering is a process of getting our hands dirty, but where and how to do that?


Luckily, there are some good patterns for us to follow. In chapter 5 and 6, we will start from the


perspective of Objective-C and ARM respectively, combine unique theories in iOS reverse


engineering with tools we’ve mentioned before, then summarize a universal methodology of


iOS reverse engineering. Let’s get started!


III

Free download pdf