Book Image

Learning zANTI2 for Android Pentesting

By : Miroslav Vitula
Book Image

Learning zANTI2 for Android Pentesting

By: Miroslav Vitula

Overview of this book

Table of Contents (12 chapters)

Summary


In this chapter, we learned what an MITM is and how it works. We also showed how to launch and hijack sessions using zANTI2 using this attack, modify packets, redirect websites, replace images, or intercept files on a victim's computer to control targets on a network. We learned more about security, difference between protocols, why it's so important to use a secure connection and possible ways of protection against MITM attacks.

It looks like our journey has come to an end. I really do hope that your knowledge about penetration tests, zANTI2, vulnerabilities, or attacks has increased after reading this book and you found all the chapters useful, educational, and possibly entertaining. I want to thank you for purchasing this book and having interest in it. It's been a joyful ride, for me at least. Thank you.