O'Reilly logo

Learning zANTI2 for Android Pentesting by Miroslav Vitula

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

MITM attacks through zANTI2

zANTI2 brings MITM to the next level. It takes advantage of intercepted network packets sent through the network and lets an attacker modify, read, or forge requests individually, inject script code to a website, or just cut the connection globally on the whole network. Let's have a look at how these functions work, how they are triggered, and their use.

First, let's see how to start the attack on one of your victims:

MITM attacks through zANTI2

The example showing the basics of MITM launched between Alice and Bob gives us an idea of how a secure connection is intercepted between two subjects. However, this is not enough for us. We want to sniff through ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required