
Amazon Prime Free Trial
FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with FREE Delivery" below the Add to Cart button and confirm your Prime free trial.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited FREE Prime delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Mobile App Reverse Engineering: Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
Purchase options and add-ons
Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issues
Key Features
- Learn the skills required to reverse engineer mobile applications
- Understand the internals of iOS and Android application binaries
- Explore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and more
Book Description
Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world’s evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps.
This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You’ll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you’ll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you’ll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues.
By the end of this reverse engineering book, you’ll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence.
What you will learn
- Understand how to set up an environment to perform reverse engineering
- Discover how Android and iOS application packages are built
- Reverse engineer Android applications and understand their internals
- Reverse engineer iOS applications built using Objective C and Swift programming
- Understand real-world case studies of reverse engineering
- Automate reverse engineering to discover low-hanging vulnerabilities
- Understand reverse engineering and how its defense techniques are used in mobile applications
Who this book is for
This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required.
Table of Contents
- Basics of Reverse Engineering – Understanding the Structure of Mobile Apps
- Setting Up a Mobile App Reverse Engineering Environment Using Modern Tools
- Reverse Engineering an Android Application
- Reverse Engineering an iOS Application
- Reverse Engineering an iOS Application (Developed Using Swift)
- Open Source and Commercial Reverse Engineering Tools
- Automating the Reverse Engineering Process
- Conclusion
- ISBN-101801073392
- ISBN-13978-1801073394
- PublisherPackt Publishing - ebooks Account
- Publication dateMay 27, 2022
- LanguageEnglish
- Dimensions9.25 x 7.52 x 0.36 inches
- Print length166 pages
Frequently bought together

Customers who bought this item also bought
Editorial Reviews
About the Author
Abhinav Mishra is the founder and director of Enciphers, a cybersecurity consulting and training company. Abhinav has over a decade of extensive experience in finding and fixing security issues in web, mobile, and infrastructure applications. He has performed penetration tests on more than 500 mobile applications and has discovered thousands of critical vulnerabilities. Abhinav completed his engineering degree in 2011 and since then has been involved in penetration testing and securing applications and infrastructure. Prior to founding Enciphers, Abhinav worked with Fortune 500 and giant tech companies as part of their security teams. In his spare time, he is a traveler, adventure seeker, and drone hobbyist.
Product details
- Publisher : Packt Publishing - ebooks Account (May 27, 2022)
- Language : English
- Paperback : 166 pages
- ISBN-10 : 1801073392
- ISBN-13 : 978-1801073394
- Item Weight : 10.6 ounces
- Dimensions : 9.25 x 7.52 x 0.36 inches
- Best Sellers Rank: #2,569,431 in Books (See Top 100 in Books)
- #632 in Computer Operating Systems (Books)
- #1,018 in Computer Networking (Books)
- #1,686 in Privacy & Online Safety
- Customer Reviews:
About the author

Abhinav Mishra is the founder and director of Enciphers, a cybersecurity consulting and training company. Abhinav has over a decade of extensive experience in finding and fixing security issues in web, mobile, and infrastructure applications. He has performed penetration tests on more than 500 mobile applications and has discovered thousands of critical vulnerabilities. Abhinav completed his engineering degree in 2011 and since then has been involved in penetration testing and securing applications and infrastructure. Prior to founding Enciphers, Abhinav worked with Fortune 500 and giant tech companies as part of their security teams. In his spare time, he is a traveler, adventure seeker, and drone hobbyist.
Customer reviews
- 5 star4 star3 star2 star1 star5 star67%0%17%16%0%67%
- 5 star4 star3 star2 star1 star4 star67%0%17%16%0%0%
- 5 star4 star3 star2 star1 star3 star67%0%17%16%0%17%
- 5 star4 star3 star2 star1 star2 star67%0%17%16%0%16%
- 5 star4 star3 star2 star1 star1 star67%0%17%16%0%0%
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on July 4, 2022This book is a great starting point for learning how to statically reverse Android and iOS apps. It discusses the various components that make up Android and iOS apps, how apps are developed, the various software tools used to create and reverse mobiles apps, and how to use certain tools to analyze, de-compile, and reverse engineer mobile applications. While it’s not a very long book, it does include detailed walkthroughs for installing and using various open-source tools (with the exception of Hopper, which utilizes the demo version). The sample applications, which the reader is instructed to download from GitHub, are written in Java, Objective C, and Swift. I appreciate that the author provided the source code for these apps and that they all have the same basic functionality, so that the reader may compare and contrast the differences between these languages and gain some experience reversing all three applications. There are case studies scattered throughout the book, which provide a good foundation of what reverse engineers and pen testers would look for in the real world when analyzing mobile applications. The author also discusses common closed-source/paid tools that are used for reversing binaries along with the licensing models for those apps. The book concludes with suggestions for how the reader may continue their studies in the world of reverse engineering mobile applications, and also lists various topics and skills the reader may choose to excel in to become experts in this field.
The target audience of this book is people who are just getting into the field of reversing mobile apps and why reversing and pen testing mobile apps is important to information security. The reader should still have some knowledge of how to use virtualization software, Ubuntu Linux, and basic command line / terminal skills. To get the most hands-on experience following along with the walkthroughs in the book, the reader will need a system running MacOS. However, if you don’t have a Mac don’t let that stop you from reading this, because the actual reversing of all of the example apps is performed on a Linux Virtual Machine. Since the author provides downloadable app packages on GitHub, there’s no need to compile those yourself.
I enjoyed all of the info the book provides on various tools used for reverse engineering mobile applications; however, I’d like to point out that Binary Ninja cloud is free to use and can provide mach-O support for reverse engineering iOS packages. (Note: I am not affiliated with Vector 35.)
In conclusion, I highly recommend this book to anyone interested in learning how to get started with analyzing and reversing mobile applications. The walkthroughs are clear, concise, and easy to follow along with. While the information won’t turn you into an expert reverse engineer, it’s a great foundation for beginners and presents a thorough list of “next steps” for those who want to dig deeper into the field of reversing mobile applications.
- Reviewed in the United States on July 5, 2022I am an Android developer and I find this book very informative and useful in getting to know the Android internal workings. I would recommend this book to anyone trying to get started in Android app reverse engineering.
Top reviews from other countries
- ChrisReviewed in the United Kingdom on February 4, 2025
2.0 out of 5 stars Lacking in detail
Just about covers the basics and doesn't go into comprehensive details. A short read with chapter's that have been padded out by repeating information found in previous chapters.
- Sunil yadavReviewed in India on May 27, 2022
5.0 out of 5 stars A great book to start your journey of mobile apps reverse engineering
I ordered this book in pre-order state, and read it in early access on Packt website. It covers the basics very well, explaining the internals of mobile app, binary structure etc. I loved the part where real world case studies are discussed.
I recommend this book to people who want to start with mobile app rev engg.
Sunil yadavA great book to start your journey of mobile apps reverse engineering
Reviewed in India on May 27, 2022
I recommend this book to people who want to start with mobile app rev engg.
Images in this review