Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Mobile Application Reverse Engineering Under the Hood
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Overview
- 3 Sensitive Data
- 4 IExplore
- 5 HTTPS
- 6 Proxy Server
- 7 Credit Card
- 8 Packet Capture
- 9 Detour
- 10 Jailbreaking
- 11 Jailbreak Applications
- 12 Keychain Security
- 13 Application Binary
- 14 snoopit
- 15 snippet
- 16 extract implementation details
- 17 classdump
- 18 dynamic analysis
- 19 usage
- 20 tool summary
- 21 Android package files
- 22 What is this
- 23 Storage Secure
- 24 Debug Bridge
- 25 Download Files
- 26 File Command
- 27 Strings Command
- 28 Les Command
- 29 Access Restricted Files
- 30 Edit a Request
- 31 Get a Response
- 32 Result
- 33 Results
- 34 Dexta Jar
- 35 Get App Off Device
- 36 Verify App
- 37 Invoke Dexta
- 38 Launch JD GUI
- 39 View Source Code
- 40 Is Encryption Strong
- 41 Java Debug Wire
- 42 Summary
- 43 Questions