Learning zANTI2 for Android Pentesting

Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2

Learning zANTI2 for Android Pentesting

This ebook is included in a Mapt subscription
Miroslav Vitula

Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
$0.00
$19.60
$34.99
$29.99p/m after trial
RRP $27.99
RRP $34.99
Subscription
eBook
Print + eBook
Start 30 Day Trial
Subscribe and access every Packt eBook & Video.
 
  • 4,000+ eBooks & Videos
  • 40+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 
Code Files
Preview in Mapt

Book Details

ISBN 139781784395049
Paperback134 pages

Book Description

A penetration test is one of the most important methods to secure a network or any individual machine. Having knowledge of these methods can enable a user to protect himself/herself from any kinds of attacks. Penetration tests can also be used to discover flaws or loop holes in one's security system, which if not fixed, can be exploited by an unwanted entity.

This book starts off with an introduction to what penetration testing is, and how it can be performed on Android using zANTI2. Once you are aware of the basics, we move on to teach you the different types of scans that can be performed to search for targets. You will then learn how to connect to open ports and intrude into an unsecured computer. From here you will explore vulnerabilities and their usage, including ShellShock and SSL Poodle vulnerability.

When connected to an open network, a user is susceptible to password and session hijacking, and a number of other cyber attacks. The book therefore ends with one of the main aspects of cyber security: the Man in the Middle attack. You will get to know everything about the MITM attack, how it works, and how one can be protected against it.

Table of Contents

Chapter 1: Introducing Android Pentesting with zANTI2
Penetration testing
zANTI2
Zetasploit
Summary
Chapter 2: Scanning for Your Victim
Network discovery
Open or closed?
Scan types
Run script
Intense scan
Device type
Running
OS CPE
OS Details
Network distance
Uptime guess
TCP sequence prediction
IP ID sequence generation
Ping scan
Quick scan and OS detection
Quick traceroute
Slow comprehensive scan
IP/ICMP scan
Script execution
Brute-force scripts
Summary
Chapter 3: Connecting to Open Ports
Open ports
Connecting to open ports
Cracking passwords
Microsoft-DS port connection
A remote desktop connection
Summary
Chapter 4: Vulnerabilities
A vulnerability
Reverse engineering
Shellshock
SSL Poodle
Zetasploit exploits
Summary
Chapter 5: Attacking – MITM Style
Man in the middle?
MITM attacks through zANTI2
Summary

What You Will Learn

  • Understand the importance of penetration testing throughout systems
  • Take a run through zANTI2’s interface and understand the requirements to the app
  • Perform advanced scanning/network mapping and discover the various types of scans used on a target
  • Discover and remotely connect to open ports on a target, thereby accessing a target's files and folders remotely
  • Detect vulnerabilities on a target, learn how to remotely exploit them, and discover ways to protect your self from these exploits
  • Understand what an MITM attack is and how it works, and apply this knowledge to perform attacks on network targets
  • Learn to hijack sessions, identify victim’s passwords, replace images on websites, inject scripts, and more
  • Use this knowledge to protect yourself from all of the attacks you will study

Authors

Table of Contents

Chapter 1: Introducing Android Pentesting with zANTI2
Penetration testing
zANTI2
Zetasploit
Summary
Chapter 2: Scanning for Your Victim
Network discovery
Open or closed?
Scan types
Run script
Intense scan
Device type
Running
OS CPE
OS Details
Network distance
Uptime guess
TCP sequence prediction
IP ID sequence generation
Ping scan
Quick scan and OS detection
Quick traceroute
Slow comprehensive scan
IP/ICMP scan
Script execution
Brute-force scripts
Summary
Chapter 3: Connecting to Open Ports
Open ports
Connecting to open ports
Cracking passwords
Microsoft-DS port connection
A remote desktop connection
Summary
Chapter 4: Vulnerabilities
A vulnerability
Reverse engineering
Shellshock
SSL Poodle
Zetasploit exploits
Summary
Chapter 5: Attacking – MITM Style
Man in the middle?
MITM attacks through zANTI2
Summary

Book Details

ISBN 139781784395049
Paperback134 pages
Read More

Read More Reviews