O'Reilly logo

Learning zANTI2 for Android Pentesting by Miroslav Vitula

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Zetasploit exploits

Let's take a look at some more vulnerabilities that can be exploited directly in zANTI2 using Zetasploit. Zetasploit offers a bunch of cloud exploits that can be remotely applied on your targets. Unfortunately, Zetasploit is only available to beta testers or to companies using the premium version that also allows you to create comprehensive security reports on devices on a network and many more features. Although you cannot directly exploit vulnerabilities through zANTI2 as a community user, it is possible to view whether a remote host is vulnerable or not, which gives you a quick idea of the target's security.

To see if there are any remotely exploitable vulnerabilities on the target, we need to intercept network packets first ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required