Time
3 hours 58 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:00
Okay, So how do you do on those questions? Let's go through them together really quick. Okay. Question one. What programmed? We used to dump IOS classes. Okay, class dumb pro doesn't exist. Class Dempsey does exist, but it's old. We could still use it, though, so we could use it for that class down for sure. Works.
00:19
And O'Toole
00:20
that also works so we can use all those three with those targets to dumb classes.
00:25
Okay, what command do we used to examine IOS libraries in an application?
00:30
Okay, well, this dumps symbols, so it's not correct.
00:35
L does not exist. D is a different target.
00:39
Dash Capitol Hill.
00:40
Okay, how do we decode in a p K file? While a peek a tool dash l doesn't exist.
00:47
Dash D File. This looks promising, but guess what? It's gotta dash in it. We don't use it with a dash,
00:54
so
00:55
B is the answer.
00:58
Okay. How do we find the name of an IOS? Execute herbal? Well, payload file. That's a directory. So it's not even a file. Settings that p list doesn't exist could exist, but it's not the correct one. Application P list does not exist, but it could info dot Peerless. That's where we find the execute Bill. Name.
01:18
Okay, What fields in the android manifest file indicate messaging object while messaging object should give you a clue, right, The object or the item intends to do something right. So intent filter is the answer here. All right, so that wraps up the knowledge check questions for this section.
01:34
I hope they weren't too bad on you. I tried to keep it light saying we just did a big lab.
01:38
But if you do have any questions, make sure you get in touch with me. I'll help you answer them and make sure you go ahead and review the material to help you reinforce the different concepts and analysis techniques and all the different theories that we covered during this module.

Up Next

Mobile Malware Analysis Fundamentals

In the Mobile Malware Analysis Fundamentals course, participants will obtain the knowledge and skills to perform basic malware analysis on mobile devices. Participants will perform these tasks by learning and implementing tools and techniques while examining malicious programs.

Instructed By

Instructor Profile Image
Brian Rogalski
CEO of Hexcapes
Instructor