Summary
In this chapter, you learned how iOS applications are developed, compiled, and packed. Then, you learned how to reverse engineer iOS apps and disassemble the binary. The reverse engineering process can go even further and help you analyze the disassembled native code and libraries. Reviewing the disassembled or reverse engineered code requires knowing the relevant architecture and instructions. During a penetration test, reverse engineering can help you find several security issues.
In the next chapter, we are going to look at reverse engineering an iOS application that's been developed in Swift. We will look at the differences between reverse engineering a Swift-based application and an Objective-C application.