"Thus, what is of supreme importance in war is to attack the enemy's strategy." | ||
--Sun Tzu, Art of War |
In the previous chapter, we studied how to perform security audit on iOS binary. You learned about reverse engineering the iOS app in order to get the actual source code. Now, we will study how to use all this knowledge while performing dynamic analysis of the application.
In this chapter, we will look at the following topics:
Understanding Objective-C runtime
Dynamic analysis using Cycript
Dynamic analysis using Snoop-it
Dynamic analysis on iOS Simulator