O'Reilly logo

Learning zANTI2 for Android Pentesting by Miroslav Vitula

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we learned what a vulnerability is, where they can be found, how they are detected and finally exploited, more about Shellshock and Poodle vulnerabilities, and how you can quickly scan for these on local or remote machines using the zANTI2 app and how a browser vulnerability is exploited using cloud exploits provided by Zetasploit.

In the next chapter, we will take a look at Man-In-The-Middle attacks, which provide literally the easiest way to hack into someone's account, steal passwords, redirect victims to other websites, or inject scripts to a website by simply intercepting a network connection between two targets. Apart from this, we will learn more about how it is possible to protect yourself from these types of attacks ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required