万本电子书0元读

万本电子书0元读

顶部广告

Learning zANTI2 for Android Pentesting电子书

售       价:¥

1人正在读 | 0人评论 9.8

作       者:Miroslav Vitula

出  版  社:Packt Publishing

出版时间:2015-08-31

字       数:55.4万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
The book is intended for those who want to know more about network penetration tests and have no prior experience, as well as for those who are experienced in network systems and are interested in discovering more about this topic.
目录展开

Learning zANTI2 for Android Pentesting

Table of Contents

Learning zANTI2 for Android Pentesting

Credits

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers, and more

Why subscribe?

Free access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Errata

Piracy

Questions

1. Introducing Android Pentesting with zANTI2

Penetration testing

Getting to know the dark side of Android

zANTI2

Mac Changer

zTether

RouterPWN

Cloud reports

The Wi-Fi monitor

The HTTP server

Nmap scan

Operative actions

Password complexity audit

Zetasploit

Summary

2. Scanning for Your Victim

Network discovery

Open or closed?

Scan types

Run script

Intense scan

OS detection

Device type

Running

OS CPE

OS Details

Network distance

Uptime guess

TCP sequence prediction

IP ID sequence generation

Ping scan

Quick scan and OS detection

Quick traceroute

Slow comprehensive scan

IP/ICMP scan

Script execution

Auth

Broadcast

Brute

Citrix

Database

Discovery

DNS

Geolocation

Protocol

Info

Brute-force scripts

Broadcast scripts

Info scripts

Intrusive scripts

Summary

3. Connecting to Open Ports

Open ports

Connecting to open ports

Cracking passwords

Microsoft-DS port connection

A remote desktop connection

Summary

4. Vulnerabilities

A vulnerability

Reverse engineering

Shellshock

SSL Poodle

Zetasploit exploits

Summary

5. Attacking – MITM Style

Man in the middle?

ARP spoofing

MITM attacks through zANTI2

Logged requests

ZPacketEditor

SSL Strip

HTTP redirection

Replacing images

Capture/intercept downloads

Insert HTML

Summary

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部