Starting zANTI in dSploitzANTI penetration tutorial

Source: Internet
Author: User

Starting zANTI in dSploitzANTI penetration tutorial
DSploitzANTI penetration tutorial-start zANTI tool to start zANTI

[Example 1-2] The following describes how to start the zANTI tool. The procedure is as follows:

(1) On the application interface of the Android device, select and start the zANTI program. The page shown in 1.19 is displayed.

Figure 1.19 Super User request

(2) This interface prompts that the zANTI tool needs to obtain the Super User permission (ROOT ). Click "authorize". The page shown in 1.20 is displayed.

Figure 1.20 zANTI logon page

(3) the interface has two tabs: Community (Community) and Registered (registration ). The registered account is billed. Therefore, select community users. Enter a string on this page (the string here is admin) and check the "I accept Zimperium's EULA" check box. Then, click the Start Now button to bring up the 1.21 dialog box.

Figure 1.21 addZNetwork

(4) This interface is a security prompt. To protect user information security, we recommend that you add it to zNetwork. In this example, a free user is used, so skip this setting. Click the Skip button. The page shown in 1.22 is displayed.

Figure 1.22 connecting to the Zimperium Service

(5) The Zimperium server is being connected. After the connection is successful, a simple tutorial on the ANTI tool is displayed, as shown in Figure 1.23.

Figure 1.23 ing Network

(6) The ing Network tutorial is displayed on the page. Click Next to display the test device tutorial, as shown in Figure 1.24.

Figure 1.24 Detection Device

(7) Click the Next button in sequence to view the tutorials for other functions, as shown in 1.25, 1.26, and 1.27.

Figure 1.25 man-in-the-middle attack

Figure 1.26 IPS Protection

Figure 1.27 enable zANTI

(8) The above is an introduction to several powerful functions of the zANTI tool. If you do not want to read the above tutorial, you can directly click the SKIP command in the upper-right corner to go directly to the interface shown in Figure 1.27. Now, you can start the zANTI tool. Before starting the tool, you must check the check box before "I am fully authorized to perform penetration testings on the network. Click Finish to start the zANTI tool. After the instance is started, the active host in the connected network is automatically scanned, as shown in Figure 1.28.

Figure 1.28 active host scanned

(9) you can see the IP address and MAC address of the active host in the network, the production attempt and the number of open port numbers in the host. For example, if the MAC address of host 192.168.1.1 is 14: E6: E4: 84: 23: 7A, the producer is Tp-Link Technologies CO, and the number of opened ports is three.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.