Starting zANTI in dSploitzANTI penetration tutorial
DSploitzANTI penetration tutorial-start zANTI tool to start zANTI
[Example 1-2] The following describes how to start the zANTI tool. The procedure is as follows:
(1) On the application interface of the Android device, select and start the zANTI program. The page shown in 1.19 is displayed.
Figure 1.19 Super User request
(2) This interface prompts that the zANTI tool needs to obtain the Super User permission (ROOT ). Click "authorize". The page shown in 1.20 is displayed.
Figure 1.20 zANTI logon page
(3) the interface has two tabs: Community (Community) and Registered (registration ). The registered account is billed. Therefore, select community users. Enter a string on this page (the string here is admin) and check the "I accept Zimperium's EULA" check box. Then, click the Start Now button to bring up the 1.21 dialog box.
Figure 1.21 addZNetwork
(4) This interface is a security prompt. To protect user information security, we recommend that you add it to zNetwork. In this example, a free user is used, so skip this setting. Click the Skip button. The page shown in 1.22 is displayed.
Figure 1.22 connecting to the Zimperium Service
(5) The Zimperium server is being connected. After the connection is successful, a simple tutorial on the ANTI tool is displayed, as shown in Figure 1.23.
Figure 1.23 ing Network
(6) The ing Network tutorial is displayed on the page. Click Next to display the test device tutorial, as shown in Figure 1.24.
Figure 1.24 Detection Device
(7) Click the Next button in sequence to view the tutorials for other functions, as shown in 1.25, 1.26, and 1.27.
Figure 1.25 man-in-the-middle attack
Figure 1.26 IPS Protection
Figure 1.27 enable zANTI
(8) The above is an introduction to several powerful functions of the zANTI tool. If you do not want to read the above tutorial, you can directly click the SKIP command in the upper-right corner to go directly to the interface shown in Figure 1.27. Now, you can start the zANTI tool. Before starting the tool, you must check the check box before "I am fully authorized to perform penetration testings on the network. Click Finish to start the zANTI tool. After the instance is started, the active host in the connected network is automatically scanned, as shown in Figure 1.28.
Figure 1.28 active host scanned
(9) you can see the IP address and MAC address of the active host in the network, the production attempt and the number of open port numbers in the host. For example, if the MAC address of host 192.168.1.1 is 14: E6: E4: 84: 23: 7A, the producer is Tp-Link Technologies CO, and the number of opened ports is three.