Book Image

Learning zANTI2 for Android Pentesting

By : Miroslav Vitula
Book Image

Learning zANTI2 for Android Pentesting

By: Miroslav Vitula

Overview of this book

Table of Contents (12 chapters)

Chapter 4. Vulnerabilities

Little holes in the system, when exploited, can ruin the whole network, exposing sensitive information, crashing and shutting down the machines. This is all because of one tiny insufficiency in a network, software, or a device—vulnerabilities.

In this chapter, you're going to:

  • Learn what vulnerabilities are and how are they found

  • Understand the basics of reverse engineering and their role in network security

  • Learn how a vulnerability can be detected using zANTI2

  • Learn how vulnerabilities are exploited using all possible tools