O'Reilly logo

Learning zANTI2 for Android Pentesting by Miroslav Vitula

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Attacking – MITM Style

We have reached the last chapter of this book, which undoubtedly is going to be the most interesting chapter. Man-in-the-middle (MITM) attacks are one of the biggest threats to any public network, they let anyone steal your personal data without your knowledge or freely control the traffic on the local area network. It's pretty simple.

In this chapter, you will learn the following:

  • What is MITM, how it works, and how you can easily trigger this attack and intrude into anyone's computer on the local area network (LAN) using zANTI2.
  • Things that you can do by taking advantage of this attack, including redirecting websites, injecting custom scripts on the websites, replacing images, and much more.
  • More about protection ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required