Excelling in iOS application reverse engineering – the way forward
This book has covered details such as IPA architecture, contents, binary formats, disassembling the iOS application binary, navigating through the disassembled code, and so on. As we know, iOS applications do not have Java bytecode but instead have the compiled binary. So, the only way to understand the functioning of an iOS application is through understanding the disassembled binary. Excelling in iOS application reverse engineering also requires a lot of other skills than those that have been discussed in this book.
Here are a few things to learn if you want to excel in the art of reverse engineering iOS applications:
- Learn more about binary reverse engineering
- Learn about Mach-O and dynamically loaded code
- Learn about runtime instrumentation using tools such as Frida