Hey guys, my name is gokul and today I'm going to show you how to use zANTI.
For those who don't know, zANTI is a penetration testing toolkit thatallows you to perform malicious attacks on a network.
You can use this tool to change device's MAC address, create a malicious WiFi hotspot, Exploit routers, Audit passwords, create andrun an HTTP server on your android device, scan a device for open ports, perform manin the middle attacks, and Check the device for shellshock and SSL poodle vulnerability.
How To Change Your Device's MAC Address? Open Zanti, swipe left, and then select “MACChanger”.
Then tap on “Set New MAC Address”.
This will change your device's MAC addressto a new random one.
But if you want to change your MAC addressto a specific one, just turn off the “Generate Random” function and then you will be ableto edit the current WiFi MAC address.
After editing, just tap on the “Set New MACAddress”.
How To Create a Malicious WiFi Hotspot? First, select “zTether” and then turn on theTether Control.
Then, let other people use your WiFi hotspot.
If they do, you will be able to control andhijack their device traffic.
you will be able to view all http requests, hijack sessions, view all images that are trasmitted on your network, modify requestsand responses, redirect HTTPS to HTTP, Redirect HTTP requests to a particular IP or webpage, replace Images, Capture downloads, Intercept Downloads, and Insert HTML into webpages.
If you want to see all the HTTP requests madeby the user(s) on your network, just tap on the first (Logged Requests) “View” option.
You can get more details about a particularrequest by tapping on it.
If you want to hijack an HTTP session, justtap on a session.
It will open up the victim's session on yourdevice.
If you want see all the images that are transmittedon your network, just tap on the second view option.
If you want to modify HTTP requests and responseson your network, select “zPacketEditor” and turn on the function, You will see the liverequests and responses there.
If you want to edit a particular request orresponse, swipe it to the right.
After the edit, you can tap on “Send” button.
If you want to redirect HTTPS to HTTP, turnon the SSL strip.
Also please note that the Websites using HSTS(HTTP Strict Transport Security) are immune to SSL Strip attack.
If you want to to redirect all the HTTP trafficto a site or server, tap on the setting icon and enter the URL, and then turn on the “RedirectHTTP” function.
If you want to replace website images (victim'sweb browser) with an image of your choice, tap on the setting icon in the replace imagessection and select an image.
Then turn on the “Replace Images” function.
If you want to intercept and download allspecified type of files to the SD card, tap on the setting icon in the Capture Downloadsection and select the file type and then turn on the “Capture Download” function.
If you want to replace a downloaded file witha specified file, tap on the setting icon in the “Intercept Download” and then selecta file.
Then turn on the “Intercept Download” function.
If you want to insert a specified HTML codeinto web pages, tap on the setting icon and enter the HTML code, and then turn on theInsert HTML function.
How to Exploit Router Vulnerabilities? First select “Routerpwn.
com” it will openup the www.
Then select your router vendor from the list, You will see many ready to run local and remote exploits there.
There are a lot of ready to run exploits, all you have to do is, click on the title.
How To Find Open Ports In a Device? First select the device's IP and then tapon “Scan”.
You can change the scan type , and you canexecte a script in the scanning, and you can also check the target device for vulnerabilities.
After configuring the scanner, just clickon “Go”.
wait for completion, and then tap on scanlog to see the results.
How To Do Password Complexity Audit? First click on the target IP and then select”Password Complexity Audit”.
Then select the cracking method.
and then the auditmode.
It will show you the progress and then theresult.
How to perform man in the middle attack? First click on the target device's IP andthen select “Man in the middle”.
Then turn on the MITM module.
This module is the same as the zTether module and I already explained that module.
So if you have any doubts, put that in the comment section.
I'm happy to help.
That's all guys, I hope you liked this video, If you did, please share this video, and also don't forget to subscribe.
I will talk to you guys in the next video.