Learning zANTI2 for Android Pentesting
()
About this ebook
Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
About This Book- Understand the basics of wireless penetration testing and its importance
- Learn the techniques to perform penetration testing on your wireless networks, such as scanning, detecting vulnerabilities in your victim, and then attacking
- This simple and intriguing guide takes a step-by-step approach that will help you get to grips with network pentesting using just your Android device and zANTI2
The book is intended for those who want to know more about network penetration tests and have no prior experience, as well as for those who are experienced in network systems and are curious to discover more about this topic. Since zANTI2 features an extremely intuitive and easy to control interface, it doesn't require any special skills.
What You Will Learn- Understand the importance of penetration testing throughout systems
- Take a run through zANTI2's interface and understand the requirements to the app
- Perform advanced scanning/network mapping and discover the various types of scans used on a target
- Discover and remotely connect to open ports on a target, thereby accessing a target's files and folders remotely
- Detect vulnerabilities on a target, learn how to remotely exploit them, and discover ways to protect your self from these exploits
- Understand what an MITM attack is and how it works, and apply this knowledge to perform attacks on network targets
- Learn to hijack sessions, identify victim's passwords, replace images on websites, inject scripts, and more
- Use this knowledge to protect yourself from all of the attacks you will study
A penetration test is one of the most important methods to secure a network or any individual machine. Having knowledge of these methods can enable a user to protect himself/herself from any kinds of attacks. Penetration tests can also be used to discover flaws or loop holes in one's security system, which if not fixed, can be exploited by an unwanted entity.
This book starts off with an introduction to what penetration testing is, and how it can be performed on Android using zANTI2. Once you are aware of the basics, we move on to teach you the different types of scans that can be performed to search for targets. You will then learn how to connect to open ports and intrude into an unsecured computer. From here you will explore vulnerabilities and their usage, including ShellShock and SSL Poodle vulnerability.
When connected to an open network, a user is susceptible to password and session hijacking, and a number of other cyber attacks. The book therefore ends with one of the main aspects of cyber security: the Man in the Middle attack. You will get to know everything about the MITM attack, how it works, and how one can be protected against it.
Style and approachThe book follows a step-by-step approach with each of the parts explained in an easy-to-follow style. Most of the methods showcased can be tried out immediately on almost any network.
Miroslav Vitula
Miroslav Vitula is a freelance graphic and motion designer and occasional Android developer with a great passion for network security. For years, he has been interested in penetration methods, exploits, and attacks done using Android devices. He explains the principles of methods used by professional network security managers and shows their usage on local networks. Some of his knowledge can be found on his blog and YouTube channel, Android Hackz, where he constantly adds new tips, tricks, and reviews about all Android-related things.
Related to Learning zANTI2 for Android Pentesting
Related ebooks
Advanced Penetration Testing with Kali Linux: Unlocking industry-oriented VAPT tactics (English Edition) Rating: 0 out of 5 stars0 ratingsLearning Pentesting for Android Devices Rating: 5 out of 5 stars5/5Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit Rating: 0 out of 5 stars0 ratingsHands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation Rating: 0 out of 5 stars0 ratingsTesting and Securing Android Studio Applications Rating: 0 out of 5 stars0 ratingsMetasploit Bootcamp Rating: 5 out of 5 stars5/5Cuckoo Malware Analysis Rating: 0 out of 5 stars0 ratingsKali Linux Network Scanning Cookbook - Second Edition Rating: 0 out of 5 stars0 ratingsKali Linux Wireless Penetration Testing Essentials Rating: 5 out of 5 stars5/5Penetration Testing with Raspberry Pi Rating: 5 out of 5 stars5/5Penetration Testing with BackBox Rating: 0 out of 5 stars0 ratingsMastering Kali Linux for Advanced Penetration Testing - Second Edition Rating: 0 out of 5 stars0 ratingsLearn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Rating: 0 out of 5 stars0 ratingsPenetration Testing Bootcamp Rating: 5 out of 5 stars5/5Penetration Testing with the Bash shell Rating: 0 out of 5 stars0 ratingsMastering Python Forensics Rating: 4 out of 5 stars4/5Effective Python Penetration Testing Rating: 0 out of 5 stars0 ratingsBuilding Virtual Pentesting Labs for Advanced Penetration Testing Rating: 0 out of 5 stars0 ratingsBackTrack: Testing Wireless Network Security Rating: 0 out of 5 stars0 ratingsNmap Essentials Rating: 4 out of 5 stars4/5Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Rating: 0 out of 5 stars0 ratingsAdvanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers Rating: 0 out of 5 stars0 ratingsInstant Java Password and Authentication Security Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing with Kali Linux - Second Edition Rating: 0 out of 5 stars0 ratingsKali Linux Wireless Penetration Testing: Beginner's Guide Rating: 0 out of 5 stars0 ratings
Internet & Web For You
Surveillance and Surveillance Detection: A CIA Insider's Guide Rating: 3 out of 5 stars3/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 5 out of 5 stars5/5Coding For Dummies Rating: 5 out of 5 stars5/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5An Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 5 out of 5 stars5/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5Podcasting For Dummies Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsThe Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Wordpress for Beginners: The Easy Step-by-Step Guide to Creating a Website with WordPress Rating: 5 out of 5 stars5/5Python QuickStart Guide: The Simplified Beginner's Guide to Python Programming Using Hands-On Projects and Real-World Applications Rating: 0 out of 5 stars0 ratingsWordPress For Dummies Rating: 0 out of 5 stars0 ratingsHTML in 30 Pages Rating: 5 out of 5 stars5/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 4 out of 5 stars4/5Beginner's Guide To Starting An Etsy Print-On-Demand Shop Rating: 0 out of 5 stars0 ratingsHow To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5
Reviews for Learning zANTI2 for Android Pentesting
0 ratings0 reviews
Book preview
Learning zANTI2 for Android Pentesting - Miroslav Vitula
Table of Contents
Learning zANTI2 for Android Pentesting
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers, and more
Why subscribe?
Free access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Errata
Piracy
Questions
1. Introducing Android Pentesting with zANTI2
Penetration testing
Getting to know the dark side of Android
zANTI2
Mac Changer
zTether
RouterPWN
Cloud reports
The Wi-Fi monitor
The HTTP server
Nmap scan
Operative actions
Password complexity audit
Zetasploit
Summary
2. Scanning for Your Victim
Network discovery
Open or closed?
Scan types
Run script
Intense scan
OS detection
Device type
Running
OS CPE
OS Details
Network distance
Uptime guess
TCP sequence prediction
IP ID sequence generation
Ping scan
Quick scan and OS detection
Quick traceroute
Slow comprehensive scan
IP/ICMP scan
Script execution
Auth
Broadcast
Brute
Citrix
Database
Discovery
DNS
Geolocation
Protocol
Info
Brute-force scripts
Broadcast scripts
Info scripts
Intrusive scripts
Summary
3. Connecting to Open Ports
Open ports
Connecting to open ports
Cracking passwords
Microsoft-DS port connection
A remote desktop connection
Summary
4. Vulnerabilities
A vulnerability
Reverse engineering
Shellshock
SSL Poodle
Zetasploit exploits
Summary
5. Attacking – MITM Style
Man in the middle?
ARP spoofing
MITM attacks through zANTI2
Logged requests
ZPacketEditor
SSL Strip
HTTP redirection
Replacing images
Capture/intercept downloads
Insert HTML
Summary
Index
Learning zANTI2 for Android Pentesting
Learning zANTI2 for Android Pentesting
Copyright © 2015 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: August 2015
Production reference: 1260815
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-78439-504-9
www.packtpub.com
Credits
Author
Miroslav Vitula
Reviewers
Manish Chauhan
Jack Miller
Fatih Ozavci
Vincent BetaBugish
Swarte
Commissioning Editor
Kartikey Pandey
Acquisition Editor
Aaron Lazar
Content Development Editor
Adrian Raposo
Technical Editors
Tejaswita Karvir
Edwin Moses
Copy Editors
Janbal Dharmaraj
Dipti Mankame
Jonathan Todd
Project Coordinator
Kinjal Bari
Proofreader
Safis Editing
Indexer
Priya Sane
Graphics
Sheetal Aute
Production Coordinator
Komal Ramchandani
Cover Work
Komal Ramchandani
About the Author
Miroslav Vitula is a freelance graphic and motion designer and occasional Android developer with a great passion for network security. For years, he has been interested in penetration methods, exploits, and attacks done using Android devices. He explains the principles of methods used by professional network security managers and shows their usage on local networks. Some of his knowledge can be found on his blog and YouTube channel, Android Hackz, where he constantly adds new tips, tricks, and reviews about all Android-related things.
Huge thanks to Aaron Lazar and Adrian Raposo for helping and guiding me through the entire process of writing a book, and also to my book reviewers, Jack Miller and Fatih Ozavci, who have provided a professional feedback while writing the book. Thanks to the Zimperium team as well for making such a useful and great application.
About the Reviewers
Manish Chauhan was born in Sunder Nagar, a small town in Himachal Pradesh. Since his childhood days, he has had a great interest in technology, and he always wanted to be a developer. This was his childhood dream and he worked hard on it during his schooldays. He studied the C and Java languages neglecting his studies and so scored fewer marks in all subjects. He lost interest in the outer world and was in love with the digital world. After his matriculation, he did his polytechnic diploma in computer science, but left it and planned to complete HSC because it was hindering his childhood dream. At this point of time, he has finished +2 and is now pursuing further education from Emblem Education. He owns two websites and one android app, which are exclusively designed and developed by him. These sites and app are named The Hacker. You can find his blogs at www.ThaHacker.in.
Jack Miller has been working on a YouTube channel called JackkTutorials since September 2011 covering programming, hacking and security, and game servers. Since 2011, he has accumulated over 4 million video views worldwide. His hacking and security tutorials have been very popular on his YouTube channel, which has led to further exploration in the subject and more videos covering topics such as Kali Linux, Burp Suite, Wireshark, SSLStrip, and zANTI.
Jack has also worked on other books in the past with Packt Publishing, such as Kali Linux Network Scanning Cookbook, Kali Linux CTF Blueprints, and many more, and hopes to continue doing so in the future and expand his knowledge.
Fatih Ozavci is a security researcher and a principal security consultant with Sense of Security. He is the author of Viproy VoIP Penetration Testing Kit and MBFuzzer Mobile Application MITM Fuzzertool. Fatih has discovered several previously unknown security vulnerabilities and design flaws in Unified Communications, IMS, IPTVMDM, and SAP-integrated mobile application environments for his customers. He has completed several unique penetration testing services and commercial trainings during his career of more than 15 years. He also handled project lead role for several penetration testing and security research projects in Europe and the APAC area. His current research is based on attacking mobile VoIP clients, VoIP service-level vulnerabilities, mobility security testing, hardware hacking, and MDM analysis. Fatih has presented his VoIP and mobile research at HITB Singapore 2015 , BlackHat USA 2014 , DefCon 23, 22, and 21, Cluecon 2013, and Ruxcon 2013. Also, he has provided VoIP and mobility security trainings at the Defcon 23, AusCert 2014, Kiwicon 2015, and Troopers 2015 events. Refer to his homepage: http://viproy.com/fozavci.
Vincent BetaBugish
Swarte is a Full Stack developer. He is self-employed (http://www.vinsert.nl) and a freelancer for Ridemi (http://www.ridemi.nl) and ArosaMedia.
I am grateful to Gaia, my beautiful girlfriend, for being in my life and being patient with me working over time. I am also grateful to Alex, my dad, for bringing me into the 'magical' world of computers at an early age and Heidi, my mother, for taking great care of me in the early stages of my life.
www.PacktPub.com
Support files, eBooks, discount offers, and more
For support files and downloads related to your book, please visit www.PacktPub.com.
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at
At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks.
https://www2.packtpub.com/books/subscription/packtlib
Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can search, access, and read Packt's entire library of books.
Why subscribe?
Fully searchable across every book published by Packt
Copy and paste, print, and bookmark content
On demand and accessible via a web browser
Free access for Packt account holders
If you have an account with Packt at www.PacktPub.com, you can use this to access PacktLib today and view 9 entirely free books. Simply use your login credentials for immediate access.
Preface
This is a complete guidebook to zANTI2 application for Android. Learn how to exploit vulnerabilities, hijack passwords, perform advanced scanning on a network, and many more operations using your Android device.
What this book covers
Chapter 1, Introducing Android Pentesting with zANTI2, as the chapter name explains, introduces the basics of Android network penetration testing, shows you some examples of software, and essentially introduces the application interface and functions.
Chapter 2, Scanning for Your Victim, focuses on network mapping