Chapter 7: Automating the Reverse Engineering Process
During a penetration test or malware analysis, reverse engineering is generally performed on one binary (or application) at a time because the aim of reverse engineering is to analyze a single application. However, there can be cases when you need to quickly analyze a lot of applications for some generic details. For example, you want to find out whether a specific method is being used in any of the applications you are working on, or you want to find out whether a specific string (or strings) is a part of any of the available application binaries.
In such cases, it would be really helpful if you could automate these tasks. A static analysis is often the very first step during a black box ...
Get Mobile App Reverse Engineering now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.