O'Reilly logo

Learning iOS Forensics - Second Edition by Pasquale Stirparo, Mattia Epifani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we introduced some tools for analyzing iOS applications, suspicious or not, mainly from a behavioral/dynamic point of view. You learned how to quickly analyze the binary, review the data and logs produced by the targeted application, intercept, manipulate, and analyze the data sent and received over the network, and automate most of the tasks with ad hoc toolkits, such as idb.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required