zANTI is an easy to use penetration testing and a security analysis toolkit.
zAnti is an android application that will run with a rooted permission on a Android phone with “permissive” SElinux.
At the highest level, zANTI lets testers know:
- Who is, or was, connected to their network.
- What isn’t safe on the network of connected devices.
- What isn’t safe in network settings.
- What isn’t safe within applications.
- What isn’t safe in your device usage.
- Where extra cyber protection is needed.
The latest version, zANTI 3.0, includes the real-world, commonly-used cyberattack technique capabilities that enable penetration testers to perform multiple operations, as outlined in the bullets and screenshots below.
Scan Your Network
Conduct network scans, in different levels, to identify connected devices and their details:
Get Detailed Information
- Device name, model and manufacturer
- Device OS and OS version
- Device open ports, network IP and MAC address
- Endpoint User-Agents
Check for Weak Points
Identify vulnerabilities by:
- Scanning without the device being exploited
- Matching known OS details
Simulate Attack Patterns
Conduct Man In the Middle (MITM) attacks in order:
- Identify device properties that won’t be identified by scanning
- Monitor decrypted data sent by the web browsers and the device application
Test With In-depth Attack Methods
Test/perform other MITM actions, e.g.,
- Session Hijacking
- User and password Phishing attempts
- Browsing redirection
- SSL stripping
- Image replacement
Enter the router management console in one click, if the username and password is not strong enough.
Producing scanning reports and enable to store and share them for each scanned network.
I would like to thank Adam Alioa for his continuous help on the zANTI project.