O'Reilly logo

Learning zANTI2 for Android Pentesting by Miroslav Vitula

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we learned what an MITM is and how it works. We also showed how to launch and hijack sessions using zANTI2 using this attack, modify packets, redirect websites, replace images, or intercept files on a victim's computer to control targets on a network. We learned more about security, difference between protocols, why it's so important to use a secure connection and possible ways of protection against MITM attacks.

It looks like our journey has come to an end. I really do hope that your knowledge about penetration tests, zANTI2, vulnerabilities, or attacks has increased after reading this book and you found all the chapters useful, educational, and possibly entertaining. I want to thank you for purchasing this book and having ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required