Inicio > > Redes y comunicaciones informáticas > Mobile App Reverse Engineering
Mobile App Reverse Engineering

Mobile App Reverse Engineering

Abhinav Mishra

52,83 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2022
Materia
Redes y comunicaciones informáticas
ISBN:
9781801073394
52,83 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issuesKey Features:Learn the skills required to reverse engineer mobile applicationsUnderstand the internals of iOS and Android application binariesExplore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and moreBook Description:Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world’s evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps.This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You’ll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you’ll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you’ll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues.By the end of this reverse engineering book, you’ll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence.What You Will Learn:Understand how to set up an environment to perform reverse engineeringDiscover how Android and iOS application packages are builtReverse engineer Android applications and understand their internalsReverse engineer iOS applications built using Objective C and Swift programmingUnderstand real-world case studies of reverse engineeringAutomate reverse engineering to discover low-hanging vulnerabilitiesUnderstand reverse engineering and how its defense techniques are used in mobile applicationsWho this book is for:This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required.

Artículos relacionados

  • Next Generation Search Engines
    Recent technological progress in computer science, Web technologies, and the constantly evolving information available on the Internet has drastically changed the landscape of search and access to information. Current search engines employ advanced techniques involving machine learning, social networks, and semantic analysis. Next Generation Search Engines: Advanced Models for ...
  • Collaboration and the Semantic Web
    Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Net...
  • Resource Allocation in Next-Generation Broadband Wireless Access Networks
    With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research o...
  • Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
    Kai Jakobs
    ...
  • Data Warehouses and OLAP
    ...
  • Selected Readings on Database Technologies and Applications
    Terry Halpin
    Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis ...

Otros libros del autor

  • The Last Remnants
    Abhinav Mishra
    In an epic tale of heroism, friendship and courage, the author introduces the readers to Vira, a loyal and just warrior of royal bloodline from a kingdom far away in another galaxy, who after saving her homeland and the entire ’star cycle’ from imminent destruction, is returning to Earth in hopes to reunite with her companions she met long ago on her path to redemption. Is this...
    Disponible

    15,60 €