O'Reilly logo

Learning zANTI2 for Android Pentesting by Miroslav Vitula

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Vulnerabilities

Little holes in the system, when exploited, can ruin the whole network, exposing sensitive information, crashing and shutting down the machines. This is all because of one tiny insufficiency in a network, software, or a device—vulnerabilities.

In this chapter, you're going to:

  • Learn what vulnerabilities are and how are they found
  • Understand the basics of reverse engineering and their role in network security
  • Learn how a vulnerability can be detected using zANTI2
  • Learn how vulnerabilities are exploited using all possible tools

A vulnerability

Generally speaking, a vulnerability represents a certain kind of weakness, which, when exploited, allows an attacker to discover more about a system. This could mean reducing information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required