Summary

We've studied how to perform various analysis on iOS binary, such as how to reverse engineer the application and check the protection of iOS binary. Now, we will use all this information in the next chapter where we will learn how to change the application behavior at runtime using dynamic analysis.

Get Learning iOS Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.