Главная
Study mode:
on
1
Intro
2
Runtime Analysis and Manipulation
3
Runtime Analysis: Android
4
Runtime Analysis: iOS
5
Snoop-it Features
6
IOS Execution Flow
7
Cycript Common Functions
8
Cycript Method Swizzling
9
Memory Dumping and Analysis
10
Memory Analysis: Android
11
Memory Analysis: iOS
12
IOS Binary Analysis
13
Disassembler
14
Other Tools..
15
Android: Decompiling
16
Example: Android Decompiling
17
Example: Decompile & Re-compile
Description:
Explore runtime manipulation techniques for Android and iOS applications in this conference talk from AppSecUSA 2014. Delve into powerful tools and methods for runtime analysis, memory manipulation, and binary analysis to enhance mobile application security testing skills. Learn about cycript, snoop-it, jdb, and other tools for runtime manipulation and memory analysis. Gain insights into iOS execution flow, method swizzling, memory dumping, and Android decompiling. Discover how to improve mobile security testing results and better understand security controls in mobile applications. Suitable for pen testers and security professionals looking to expand their mobile security toolbox.

Runtime Manipulation of Android and iOS Applications - Mobile Security Testing

OWASP Foundation
Add to list
0:00 / 0:00