Mobile Application Reverse Engineering Under the Hood

Mobile Application Reverse Engineering Under the Hood

via YouTube Direct link

Introduction

1 of 43

1 of 43

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Mobile Application Reverse Engineering Under the Hood

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Overview
  3. 3 Sensitive Data
  4. 4 IExplore
  5. 5 HTTPS
  6. 6 Proxy Server
  7. 7 Credit Card
  8. 8 Packet Capture
  9. 9 Detour
  10. 10 Jailbreaking
  11. 11 Jailbreak Applications
  12. 12 Keychain Security
  13. 13 Application Binary
  14. 14 snoopit
  15. 15 snippet
  16. 16 extract implementation details
  17. 17 classdump
  18. 18 dynamic analysis
  19. 19 usage
  20. 20 tool summary
  21. 21 Android package files
  22. 22 What is this
  23. 23 Storage Secure
  24. 24 Debug Bridge
  25. 25 Download Files
  26. 26 File Command
  27. 27 Strings Command
  28. 28 Les Command
  29. 29 Access Restricted Files
  30. 30 Edit a Request
  31. 31 Get a Response
  32. 32 Result
  33. 33 Results
  34. 34 Dexta Jar
  35. 35 Get App Off Device
  36. 36 Verify App
  37. 37 Invoke Dexta
  38. 38 Launch JD GUI
  39. 39 View Source Code
  40. 40 Is Encryption Strong
  41. 41 Java Debug Wire
  42. 42 Summary
  43. 43 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.