Book Image

Learning zANTI2 for Android Pentesting

By : Miroslav Vitula
Book Image

Learning zANTI2 for Android Pentesting

By: Miroslav Vitula

Overview of this book

Table of Contents (12 chapters)

Summary


In this chapter, we learned what a vulnerability is, where they can be found, how they are detected and finally exploited, more about Shellshock and Poodle vulnerabilities, and how you can quickly scan for these on local or remote machines using the zANTI2 app and how a browser vulnerability is exploited using cloud exploits provided by Zetasploit.

In the next chapter, we will take a look at Man-In-The-Middle attacks, which provide literally the easiest way to hack into someone's account, steal passwords, redirect victims to other websites, or inject scripts to a website by simply intercepting a network connection between two targets. Apart from this, we will learn more about how it is possible to protect yourself from these types of attacks by using an HTTPS-encrypted connection or using ARP spoofing detectors.