Book Image

Learning zANTI2 for Android Pentesting

By : Miroslav Vitula
Book Image

Learning zANTI2 for Android Pentesting

By: Miroslav Vitula

Overview of this book

Table of Contents (12 chapters)

Connecting to open ports


We're getting to the next stage of establishing a stable connection between our target, a remote machine on a local network, and devices. There are various ways and types of connections, with zANTI2 offering many of them.

The type of connection varies with every port. With some ports the connection is only indicating a port is active; however, some ports can be dangerous for the target itself. The type of connection depends on the port type. For instance, establishing a connection to SSH port 22 with a router lets you execute Linux commands on the target, which then allows you to list the directories or change the access password.

However, the connection can be password-protected. For instance, you're probably using a password on your desktop PC or laptop. While you're using this password protection to stop people accessing your machine, the network may be a much more dangerous place.

Let's start from the beginning. Start by network mapping the whole local area to discover...