Runtime Manipulation of Android and iOS Applications - Mobile Security Testing

Runtime Manipulation of Android and iOS Applications - Mobile Security Testing

OWASP Foundation via YouTube Direct link

IOS Binary Analysis

12 of 17

12 of 17

IOS Binary Analysis

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Runtime Manipulation of Android and iOS Applications - Mobile Security Testing

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Runtime Analysis and Manipulation
  3. 3 Runtime Analysis: Android
  4. 4 Runtime Analysis: iOS
  5. 5 Snoop-it Features
  6. 6 IOS Execution Flow
  7. 7 Cycript Common Functions
  8. 8 Cycript Method Swizzling
  9. 9 Memory Dumping and Analysis
  10. 10 Memory Analysis: Android
  11. 11 Memory Analysis: iOS
  12. 12 IOS Binary Analysis
  13. 13 Disassembler
  14. 14 Other Tools..
  15. 15 Android: Decompiling
  16. 16 Example: Android Decompiling
  17. 17 Example: Decompile & Re-compile

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.