Book Image

Learning zANTI2 for Android Pentesting

By : Miroslav Vitula
Book Image

Learning zANTI2 for Android Pentesting

By: Miroslav Vitula

Overview of this book

Table of Contents (12 chapters)

Zetasploit exploits


Let's take a look at some more vulnerabilities that can be exploited directly in zANTI2 using Zetasploit. Zetasploit offers a bunch of cloud exploits that can be remotely applied on your targets. Unfortunately, Zetasploit is only available to beta testers or to companies using the premium version that also allows you to create comprehensive security reports on devices on a network and many more features. Although you cannot directly exploit vulnerabilities through zANTI2 as a community user, it is possible to view whether a remote host is vulnerable or not, which gives you a quick idea of the target's security.

To see if there are any remotely exploitable vulnerabilities on the target, we need to intercept network packets first using an MITM attack. This attack is based on an intercepted connection between a victim (receiver) and a sender. The attacker literally stands between these two targets, masking himself by using spoofed public keys used by the sender and receiver...