January 2016
Beginner
204 pages
3h 54m
English
We've studied one of the important concepts of Objective- C applications, that is, runtime analysis. You learned dynamic analysis using different techniques such as the Cycript command-line tool and the Snoop-it GUI tool.
In the next chapter, we will study how to exploit iOS in order to get shell access of iDevice and also how to use iDevice as a pentesting device in order to exploit other devices.
Read now
Unlock full access