Mobile App Reverse Engineering :: Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps /
Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issues Key Features Learn the skills required to reverse engineer mobile applications Understand the internals...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing, Limited,
2022.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issues Key Features Learn the skills required to reverse engineer mobile applications Understand the internals of iOS and Android application binaries Explore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and more Book Description Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world's evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps. This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You'll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you'll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you'll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues. By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence. What you will learn Understand how to set up an environment to perform reverse engineering Discover how Android and iOS application packages are built Reverse engineer Android applications and understand their internals Reverse engineer iOS applications built using Objective C and Swift programming Understand real-world case studies of reverse engineering Automate reverse engineering to discover low-hanging vulnerabilities Understand reverse engineering and how its defense techniques are used in mobile applications Who this book is for This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required. |
Beschreibung: | 1 online resource (166 pages) : color illustrations |
ISBN: | 1801074909 9781801074902 |
Internformat
MARC
LEADER | 00000cam a22000007a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1317324364 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 220514s2022 enka o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d ORMDA |d OCLCF |d OCLCQ |d N$T |d UKMGB |d OCLCQ |d IEEEE |d OCLCO | ||
015 | |a GBC274167 |2 bnb | ||
016 | 7 | |a 020566472 |2 Uk | |
020 | |a 1801074909 | ||
020 | |a 9781801074902 |q (electronic bk.) | ||
020 | |z 9781801073394 (pbk.) | ||
035 | |a (OCoLC)1317324364 | ||
037 | |a 9781801073394 |b O'Reilly Media | ||
037 | |a 10163628 |b IEEE | ||
050 | 4 | |a QA76.76.A65 | |
082 | 7 | |a 005.1 |2 23/eng/20220602 | |
049 | |a MAIN | ||
100 | 1 | |a Mishra, Abhinav. | |
245 | 1 | 0 | |a Mobile App Reverse Engineering : |b Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps / |c Abhinav Mishra. |
260 | |a Birmingham : |b Packt Publishing, Limited, |c 2022. | ||
300 | |a 1 online resource (166 pages) : |b color illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
520 | |a Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issues Key Features Learn the skills required to reverse engineer mobile applications Understand the internals of iOS and Android application binaries Explore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and more Book Description Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world's evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps. This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You'll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you'll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you'll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues. By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence. What you will learn Understand how to set up an environment to perform reverse engineering Discover how Android and iOS application packages are built Reverse engineer Android applications and understand their internals Reverse engineer iOS applications built using Objective C and Swift programming Understand real-world case studies of reverse engineering Automate reverse engineering to discover low-hanging vulnerabilities Understand reverse engineering and how its defense techniques are used in mobile applications Who this book is for This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required. | ||
505 | 0 | |a Table of Contents Basics of Reverse Engineering - Understanding the Structure of Mobile Apps Setting Up a Mobile App Reverse Engineering Environment Using Modern Tools Reverse Engineering an Android Application Reverse Engineering an iOS Application Reverse Engineering an iOS Application (Developed Using Swift) Open Source and Commercial Reverse Engineering Tools Automating the Reverse Engineering Process Conclusion. | |
650 | 0 | |a Application software |x Development. |0 http://id.loc.gov/authorities/subjects/sh95009362 | |
650 | 0 | |a Mobile apps |x Testing. | |
650 | 0 | |a Application software |x Testing. | |
650 | 6 | |a Logiciels d'application |x Développement. | |
650 | 7 | |a Application software |x Development |2 fast | |
650 | 7 | |a Application software |x Testing |2 fast | |
776 | 0 | 8 | |i Print version: |a Mishra, Abhinav. |t Mobile App Reverse Engineering. |d Birmingham : Packt Publishing, Limited, ©2022 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3270552 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3270552 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL6970217 | ||
938 | |a EBSCOhost |b EBSC |n 3270552 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1317324364 |
---|---|
_version_ | 1826942350588379136 |
adam_text | |
any_adam_object | |
author | Mishra, Abhinav |
author_facet | Mishra, Abhinav |
author_role | |
author_sort | Mishra, Abhinav |
author_variant | a m am |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.A65 |
callnumber-search | QA76.76.A65 |
callnumber-sort | QA 276.76 A65 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Table of Contents Basics of Reverse Engineering - Understanding the Structure of Mobile Apps Setting Up a Mobile App Reverse Engineering Environment Using Modern Tools Reverse Engineering an Android Application Reverse Engineering an iOS Application Reverse Engineering an iOS Application (Developed Using Swift) Open Source and Commercial Reverse Engineering Tools Automating the Reverse Engineering Process Conclusion. |
ctrlnum | (OCoLC)1317324364 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05006cam a22004937a 4500</leader><controlfield tag="001">ZDB-4-EBA-on1317324364</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">220514s2022 enka o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">ORMDA</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC274167</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">020566472</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1801074909</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801074902</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781801073394 (pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1317324364</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781801073394</subfield><subfield code="b">O'Reilly Media</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">10163628</subfield><subfield code="b">IEEE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.A65</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.1</subfield><subfield code="2">23/eng/20220602</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mishra, Abhinav.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile App Reverse Engineering :</subfield><subfield code="b">Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps /</subfield><subfield code="c">Abhinav Mishra.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing, Limited,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (166 pages) :</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issues Key Features Learn the skills required to reverse engineer mobile applications Understand the internals of iOS and Android application binaries Explore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and more Book Description Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world's evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps. This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You'll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you'll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you'll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues. By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence. What you will learn Understand how to set up an environment to perform reverse engineering Discover how Android and iOS application packages are built Reverse engineer Android applications and understand their internals Reverse engineer iOS applications built using Objective C and Swift programming Understand real-world case studies of reverse engineering Automate reverse engineering to discover low-hanging vulnerabilities Understand reverse engineering and how its defense techniques are used in mobile applications Who this book is for This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Table of Contents Basics of Reverse Engineering - Understanding the Structure of Mobile Apps Setting Up a Mobile App Reverse Engineering Environment Using Modern Tools Reverse Engineering an Android Application Reverse Engineering an iOS Application Reverse Engineering an iOS Application (Developed Using Swift) Open Source and Commercial Reverse Engineering Tools Automating the Reverse Engineering Process Conclusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95009362</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile apps</subfield><subfield code="x">Testing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Testing.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels d'application</subfield><subfield code="x">Développement.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Application software</subfield><subfield code="x">Testing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Mishra, Abhinav.</subfield><subfield code="t">Mobile App Reverse Engineering.</subfield><subfield code="d">Birmingham : Packt Publishing, Limited, ©2022</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3270552</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3270552</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6970217</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">3270552</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1317324364 |
illustrated | Illustrated |
indexdate | 2025-03-18T14:26:37Z |
institution | BVB |
isbn | 1801074909 9781801074902 |
language | English |
oclc_num | 1317324364 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (166 pages) : color illustrations |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing, Limited, |
record_format | marc |
spelling | Mishra, Abhinav. Mobile App Reverse Engineering : Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps / Abhinav Mishra. Birmingham : Packt Publishing, Limited, 2022. 1 online resource (166 pages) : color illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issues Key Features Learn the skills required to reverse engineer mobile applications Understand the internals of iOS and Android application binaries Explore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and more Book Description Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world's evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps. This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You'll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you'll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you'll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues. By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence. What you will learn Understand how to set up an environment to perform reverse engineering Discover how Android and iOS application packages are built Reverse engineer Android applications and understand their internals Reverse engineer iOS applications built using Objective C and Swift programming Understand real-world case studies of reverse engineering Automate reverse engineering to discover low-hanging vulnerabilities Understand reverse engineering and how its defense techniques are used in mobile applications Who this book is for This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required. Table of Contents Basics of Reverse Engineering - Understanding the Structure of Mobile Apps Setting Up a Mobile App Reverse Engineering Environment Using Modern Tools Reverse Engineering an Android Application Reverse Engineering an iOS Application Reverse Engineering an iOS Application (Developed Using Swift) Open Source and Commercial Reverse Engineering Tools Automating the Reverse Engineering Process Conclusion. Application software Development. http://id.loc.gov/authorities/subjects/sh95009362 Mobile apps Testing. Application software Testing. Logiciels d'application Développement. Application software Development fast Application software Testing fast Print version: Mishra, Abhinav. Mobile App Reverse Engineering. Birmingham : Packt Publishing, Limited, ©2022 |
spellingShingle | Mishra, Abhinav Mobile App Reverse Engineering : Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps / Table of Contents Basics of Reverse Engineering - Understanding the Structure of Mobile Apps Setting Up a Mobile App Reverse Engineering Environment Using Modern Tools Reverse Engineering an Android Application Reverse Engineering an iOS Application Reverse Engineering an iOS Application (Developed Using Swift) Open Source and Commercial Reverse Engineering Tools Automating the Reverse Engineering Process Conclusion. Application software Development. http://id.loc.gov/authorities/subjects/sh95009362 Mobile apps Testing. Application software Testing. Logiciels d'application Développement. Application software Development fast Application software Testing fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh95009362 |
title | Mobile App Reverse Engineering : Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps / |
title_auth | Mobile App Reverse Engineering : Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps / |
title_exact_search | Mobile App Reverse Engineering : Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps / |
title_full | Mobile App Reverse Engineering : Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps / Abhinav Mishra. |
title_fullStr | Mobile App Reverse Engineering : Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps / Abhinav Mishra. |
title_full_unstemmed | Mobile App Reverse Engineering : Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps / Abhinav Mishra. |
title_short | Mobile App Reverse Engineering : |
title_sort | mobile app reverse engineering get started with discovering analyzing and exploring the internals of android and ios apps |
title_sub | Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps / |
topic | Application software Development. http://id.loc.gov/authorities/subjects/sh95009362 Mobile apps Testing. Application software Testing. Logiciels d'application Développement. Application software Development fast Application software Testing fast |
topic_facet | Application software Development. Mobile apps Testing. Application software Testing. Logiciels d'application Développement. Application software Development Application software Testing |
work_keys_str_mv | AT mishraabhinav mobileappreverseengineeringgetstartedwithdiscoveringanalyzingandexploringtheinternalsofandroidandiosapps |