Time
1 hour 12 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:00
All right, folks. Time for the final quiz. This one is tools for testers. The section you just watched and we're gonna cover three questions. They'll be that pause so you can pause in between it. I'll count to three and then give you the answer for this first question,
00:16
what do network testing and forensics testing have in common?
00:21
One
00:22
to
00:24
three.
00:26
So I said this a couple times, but the at must be exercised, Really? With any type of dynamic testing or any type of testing where you really want. Oh, you run through that app. Forensics testing network testing. You have to exercise the app. I said this repeatedly,
00:42
and I hope you pay attention to it cause when you do start testing mobile laps, you're gonna realize, Oh, man, there are so many different work flows in here, and I want to make sure exercise all of them.
00:54
Question two in Android, we go from debts to Smalley. Code
00:58
would be the equivalent to that in IOS
01:02
one
01:03
to
01:04
three.
01:07
So in general, the answer is executed. Coat to dissembled, code or assembly. Ah, you might have seen that screenshot I shared and you saw that you had this excusable binary and then you had this disassembled code and that basically is assembly. And that is typically the path that a lot of people go through when they're reverse engineering mobile laps
01:26
and you know you might see that and think, Wow, that's really daunting. And at first it is That is the truth. You know, it's Ah challenge, but you start to make sense of it. It's like in the Matrix, you know, you see all of the green lines, and eventually neo is able to see what it all means. And, you know, soon you'll be neo
01:46
time for the final question.
01:48
What open source tools are useful for for reverse engineering
01:52
one
01:53
to
01:53
three.
01:57
So there's really a lot of answers here. But the ones I mentioned specifically were freed and radar A are, too, if you will. And both of these tools are great for kind of doing static reverse engineering and dynamic analysis engine reverse engineering, where we want to see what the APP does. There's a ton of other tools out there to like Gen x gooey JD Gooey.
02:15
There's cutter.
02:17
There's a ton of other tools, but these air really popular open source tools, and you know there's others out there, too. So don't be limited by just that. And, you know, explore the open source tool market because there's a lot of cool developers doing really interesting resource research and creating really good tools.
02:37
Again, this was the last quiz, so if you made it through any, answer them all correctly. Great. And if you didn't, it's OK. Re watch the videos, make sense of them and keep on learning. I hope to see you soon.

Mobile App Security

In this course, you’ll learn how to crawl, walk, then run in mobile app security testing, with an end goal of having all the tools and knowledge necessary to become a mobile appsec expert.

Instructed By

Instructor Profile Image
Tony Ramirez
Senior Application Security Analyst
Instructor