Runtime Manipulation of Android and iOS Applications - Mobile Security Testing

Runtime Manipulation of Android and iOS Applications - Mobile Security Testing

OWASP Foundation via YouTube Direct link

Memory Analysis: iOS

11 of 17

11 of 17

Memory Analysis: iOS

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Runtime Manipulation of Android and iOS Applications - Mobile Security Testing

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Runtime Analysis and Manipulation
  3. 3 Runtime Analysis: Android
  4. 4 Runtime Analysis: iOS
  5. 5 Snoop-it Features
  6. 6 IOS Execution Flow
  7. 7 Cycript Common Functions
  8. 8 Cycript Method Swizzling
  9. 9 Memory Dumping and Analysis
  10. 10 Memory Analysis: Android
  11. 11 Memory Analysis: iOS
  12. 12 IOS Binary Analysis
  13. 13 Disassembler
  14. 14 Other Tools..
  15. 15 Android: Decompiling
  16. 16 Example: Android Decompiling
  17. 17 Example: Decompile & Re-compile

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.