Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learning zANTI2  for Android Pentesting

You're reading from   Learning zANTI2 for Android Pentesting Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2

Arrow left icon
Product type Paperback
Published in Aug 2015
Publisher
ISBN-13 9781784395049
Length 134 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Miroslav Vitula Miroslav Vitula
Author Profile Icon Miroslav Vitula
Miroslav Vitula
Arrow right icon
View More author details
Toc

Zetasploit

Leaving the public clueless about further development of zANTI, the Zimperium team has successfully made cloud exploits available from within the app and created something known as Zetasploit.

Using Metasploit, one of the most used penetration utilities, Zetasploit aims to run and exploit vulnerabilities based on scan results. Unfortunately, Zetasploit is available to enterprise users only and supposedly will be available for public users as well at some time. Hopefully, it is now when you're reading these lines!

You've probably seen the video showing the power of Zetasploit. (If not, look it up, it's crazy—https://youtu.be/di5FHSh3Z7c).

From what we know, there are over eight separate exploits (probably many more) available from the server, then there's a client tab followed by file intercept.

The guy seems to run a Windows exploit that exploits a parsing flaw in the path canonicalization code of NetAPI32.dll through the server service. Then, he selects an available VNC payload to connect the desktop and finally launches the exploit.

He then takes control of the entire system using the graphical interface, which was successfully provided by the VNC.

VNC is not the only option for connecting to the victim; the video also shows us how to interact with the generic shell and execute the shutdown –r command, which reboots the computer. Easy, peasy!

Although all of these sound very interesting, we'll probably not get our hands on them till they're officially announced in the next release. However, as you will read in Chapter 3, Connecting to Open Ports, regarding connecting to open ports, it is possible to intrude into a computer using port number 3389, which is responsible for remote desktop connection.

That being said, you can't run Metasploit on your Android powered device. Or can you?

Oh, of course you can! The newly-updated cSploit, which is being continuously updated by one of the former developers of dSploit has (apart from original dSploit features) slightly improved tweaks and added new features such as:

  • The vulnerability finder
  • The exploit finder
  • Metasploit Framework integration

At least that's what http://www.csploit.org/ says, and it looks like the app is doing really well. Since the main developer is only one person and is often busy, we can't expect frequent updates, but it's great to see that we can use Metasploit exploits using a free Android tool.

You have been reading a chapter from
Learning zANTI2 for Android Pentesting
Published in: Aug 2015
Publisher:
ISBN-13: 9781784395049
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image