Book Image

Learning zANTI2 for Android Pentesting

By : Miroslav Vitula
Book Image

Learning zANTI2 for Android Pentesting

By: Miroslav Vitula

Overview of this book

Table of Contents (12 chapters)

Chapter 5. Attacking – MITM Style

We have reached the last chapter of this book, which undoubtedly is going to be the most interesting chapter. Man-in-the-middle (MITM) attacks are one of the biggest threats to any public network, they let anyone steal your personal data without your knowledge or freely control the traffic on the local area network. It's pretty simple.

In this chapter, you will learn the following:

  • What is MITM, how it works, and how you can easily trigger this attack and intrude into anyone's computer on the local area network (LAN) using zANTI2.

  • Things that you can do by taking advantage of this attack, including redirecting websites, injecting custom scripts on the websites, replacing images, and much more.

  • More about protection against these types of attacks because after all, you could be the next victim! Also we'll have a look at the Hyper Text Transfer Protocol Secure (HTTPS) protocol, which is here to prevent these types of attacks but also shows how to bypass this security...