YoVDO

Runtime Manipulation of Android and iOS Applications - Mobile Security Testing

Offered By: OWASP Foundation via YouTube

Tags

Mobile Application Security Courses Penetration Testing Courses Android Security Courses Binary Analysis Courses iOS Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore runtime manipulation techniques for Android and iOS applications in this conference talk from AppSecUSA 2014. Delve into powerful tools and methods for runtime analysis, memory manipulation, and binary analysis to enhance mobile application security testing skills. Learn about cycript, snoop-it, jdb, and other tools for runtime manipulation and memory analysis. Gain insights into iOS execution flow, method swizzling, memory dumping, and Android decompiling. Discover how to improve mobile security testing results and better understand security controls in mobile applications. Suitable for pen testers and security professionals looking to expand their mobile security toolbox.

Syllabus

Intro
Runtime Analysis and Manipulation
Runtime Analysis: Android
Runtime Analysis: iOS
Snoop-it Features
IOS Execution Flow
Cycript Common Functions
Cycript Method Swizzling
Memory Dumping and Analysis
Memory Analysis: Android
Memory Analysis: iOS
IOS Binary Analysis
Disassembler
Other Tools..
Android: Decompiling
Example: Android Decompiling
Example: Decompile & Re-compile


Taught by

OWASP Foundation

Related Courses

Threat Hunting with Yara
Pluralsight
Reverse Engineering 3201: Symbolic Analysis
OpenSecurityTraining2 via Independent
Firing Rounds at the Analysis Shooting Gallery - CSAW'16 Security Workshop
New York University (NYU) via YouTube
angr: Binary Analysis Framework - Demonstration and Analysis
New York University (NYU) via YouTube
Debin: Predicting Debug Information in Stripped Binaries
Association for Computing Machinery (ACM) via YouTube