O'Reilly logo

Learning zANTI2 for Android Pentesting by Miroslav Vitula

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Scanning for Your Victim

As you might've guessed already, a scan is something essential, especially in our case of performing MITM-type of attacks and whatnot. Without completing a successful scan, we would not be able to perform a successful attack. In this chapter, we're going to:

  • Learn what scanning and network discovery is
  • Find out the different types of scans and categories zANTI provides
  • Understand what each scan one does
  • Identify which method is best suited for a particular scenario

Network discovery

Let's proceed to the stage of looking around: detecting victims and scanning. Imagine this situation as the one over a shooting range: you grab your weapon (zANTI2, in our case), aim and shoot. You have to aim for your target, obviously—otherwise, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required