From 5034e6059f29b804fcb3d4feebc591c1daef7709 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fran=C3=A7ois=20Benaiteau?= Date: Tue, 30 Jun 2020 10:45:21 +0200 Subject: [PATCH] Fixes wording --- Module-1/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Module-1/README.md b/Module-1/README.md index c0cc98c..a3bd18c 100644 --- a/Module-1/README.md +++ b/Module-1/README.md @@ -16,7 +16,7 @@ _Note: If you need help jailbreaking your device, there are many resources onlin sudo pip install frida-tools ``` - Download the latest version of [Bettercap](https://www.bettercap.org/installation/): Bettercap will allow you to perform MitM attacks remotely to a device. -- Download the latest version of [class-dump-z](https://code.google.com/archive/p/networkpx/downloads): class-dump-z will allow you to dump Objc classes. There's a Swift version but you won't needed since my vulnerable app is written in Objc. +- Download the latest version of [class-dump-z](https://code.google.com/archive/p/networkpx/downloads): class-dump-z will allow you to dump Objc classes. There's a Swift version but you won't need it since my vulnerable app is written in Objc. - Download the latest version of [momdec](https://github.com/atomicbird/momdec): momdec will allow you to decompile CoreData models. - Download the latest version of [Ghidra](https://ghidra-sre.org/): Ghidra is another reverse engineering tool, which will let you do some of the same tasks as Hopper. ##### If your device is on iOS 10.x