Book Image

Learning zANTI2 for Android Pentesting

By : Miroslav Vitula
Book Image

Learning zANTI2 for Android Pentesting

By: Miroslav Vitula

Overview of this book

Table of Contents (12 chapters)

MITM attacks through zANTI2


zANTI2 brings MITM to the next level. It takes advantage of intercepted network packets sent through the network and lets an attacker modify, read, or forge requests individually, inject script code to a website, or just cut the connection globally on the whole network. Let's have a look at how these functions work, how they are triggered, and their use.

First, let's see how to start the attack on one of your victims:

The example showing the basics of MITM launched between Alice and Bob gives us an idea of how a secure connection is intercepted between two subjects. However, this is not enough for us. We want to sniff through the entire network, no matter how many connections there are and how many people are browsing the Net, typing passwords, or communicating. We want to intrude into all of them.

To do so, instead of selecting an individual device, we will tap on the main router (192.168.1.1) or select the entire network field with 192.168.1.1/24. This is known...