iOS App Reverse Engineering

iOS App Reverse Engineering

This book covers concepts, tools, theories and practices of iOS App reverse engineering, intended for iOS enthusiasts, senior iOS developers, iOS architects, and reverse engineers in other systems who’re also interested in iOS.

Tag(s): iPhone iOS

Publication date: 01 Apr 2015

ISBN-10: n/a

ISBN-13: n/a

Paperback: 442 pages

Views: 9,750

Type: N/A

Publisher: GitHub

License: Standard Copyright License

Post time: 31 Jan 2016 09:49:06

iOS App Reverse Engineering

iOS App Reverse Engineering This book covers concepts, tools, theories and practices of iOS App reverse engineering, intended for iOS enthusiasts, senior iOS developers, iOS architects, and reverse engineers in other systems who’re also interested in iOS.
Tag(s): iPhone iOS
Publication date: 01 Apr 2015
ISBN-10: n/a
ISBN-13: n/a
Paperback: 442 pages
Views: 9,750
Document Type: N/A
Publisher: GitHub
License: Standard Copyright License
Post time: 31 Jan 2016 09:49:06
Excerpts from the Preface:

iOS App Reverse Engineering is the world's 1st book of very detailed iOS App reverse engineering skills, targeting 4 kinds of readers:

- iOS enthusiasts;
- Senior iOS developers, who have good command of App development and have the desire to understand iOS better;
- Architects. During the process of reverse engineering, they can learn architectures of those excellent Apps so that they can improve their ability of architecture design;
- Reverse engineers in other systems who’re also interested in iOS.

The book consists of 4 parts, i.e. concepts, tools, theories and practices. The book follows an "abstraction, concrete, abstraction, concrete" structure, starting from basic concepts like iOS filesystem hierarchy and iOS file types that Apple didn't expose to App developers but iOS (jailbreak) researchers should know, then goes through the most commonly used tools like class-dump, Theos, Cycript, Reveal, IDA and LLDB to introduce what to do in iOS reverse engineering. After that, iOS reverse engineering theories based on Objective-C and ARM assembly are explained in a methodological way, pointing out the core of this book. Last but not least, 4 originally elaborated practices are there to cover all previous contents of the book and give you the most intuitive perception of iOS reverse engineering. Happy hacking!




About The Author(s)


No information is available for this author.

Dustin L. Howett

No information is available for this author.


No information is available for this author.

Snake Ninny

No information is available for this author.


No information is available for this author.

Zishe Sha

No information is available for this author.


Book Categories
Sponsors