Book Image

Learning zANTI2 for Android Pentesting

By : Miroslav Vitula
Book Image

Learning zANTI2 for Android Pentesting

By: Miroslav Vitula

Overview of this book

Table of Contents (12 chapters)

IP ID sequence generation


This field describes the ID generation algorithm recognized by Nmap, showing a possible vulnerability (to TCP Idle scan, for instance) in the system. However, many systems use a different IP ID for each host they communicate with. In this case, they may appear vulnerable while in fact being secure against the attacks.

Have a look at the scan results of the Intense scan. If you look carefully, the Nmap log shows many more then expected. Notice the port scan, showing four open ports, two of which have been diagnosed with version numbers.

Also, notice the warning line saying the OS scan results may not be reliable because Nmap was not capable of finding at least one open and one closed port.

If a message like this shows up, keep in mind that the OS scan loses its accuracy.

The uptime shows up to be somewhere around two days, which in this case, seems to be quite correct.

Let's move on to the other scan types. Whereas the Intense scan is the most comprehensive and accurate...