Summary
This chapter explained Swift programming and Swift-based iOS applications (binaries). To reverse engineer a Swift-based application binary, we can use previously used tools such as Hopper or Ghidra. But in this chapter, we saw how to use the Radare2 framework and explore the internals of the binary, extract useful information, and navigate to the code logic/flow.
As we saw that the iOS applications have compiled binaries, which are used during reverse engineering, to analyze the binaries further, we would need the knowledge of binary reverse engineering as well as how the processor instructions work. Generally, the reverse engineering of mobile applications is done during a penetration test, malware analysis, and so on. Understanding the assembly instructions and different architecture is very much a prerequisite for advanced reverse engineering. The more you explore these fantastic tools and perform reverse engineering of different types of applications, the more you will...