All fingerprints that are examined by Nmap carry a general type of device (target)—this might be router, firewall, printer, or general purpose device—here, we can see the target listed as general purpose/phone. If Nmap is unsure about multiple results, it will show both of them, separating these with the pipe symbol (router|firewall).
Learning zANTI2 for Android Pentesting
By :
Learning zANTI2 for Android Pentesting
By:
Overview of this book
Table of Contents (12 chapters)
Learning zANTI2 for Android Pentesting
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Introducing Android Pentesting with zANTI2
Scanning for Your Victim
Connecting to Open Ports
Vulnerabilities
Attacking – MITM Style
Index
Customer Reviews