What this book covers
Chapter 1, Introducing Android Pentesting with zANTI2, as the chapter name explains, introduces the basics of Android network penetration testing, shows you some examples of software, and essentially introduces the application interface and functions.
Chapter 2, Scanning for Your Victim, focuses on network mapping and Nmap scans, which are very important in network penetration testing.
Chapter 3, Connecting to Open Ports, explains more about open ports and its usability in penetration tests, connecting to computers remotely using various clients, and more.
Chapter 4, Vulnerabilities, explains how to detect and essentially exploit a remote vulnerability on a server or a computer.
Chapter 5, Attacking – MITM Style, guides you through the various techniques for attacking a remote machine using zANTI2. This includes password hijacking, image replacement, and many more operations.