• Write for Us
  • Courses
  • Blog
  • About Us
  • Contact
    Hacker Academy
    • Write for Us
    • Courses
    • Blog
    • About Us
    • Contact

      Android

      • Home
      • Android
      • MITM Attack with Zanti – Android MITM

      MITM Attack with Zanti – Android MITM

      • Posted by shubham
      • Categories Android
      • Tags man in the middle attack, mitm, mitm with android, zanti
      Password Cracking Tools

      If you have read my previous articles on man-in-the-middle attacks then you know how powerful they can be. But many people kept asking me if this could be done on their android phones without having to use kali Linux.

      Well, luckily we have zanti which has automated almost all of the hacking processes. Do note that this tool by no means is perfect however it works like a charm on all older versions of windows. However, after windows 10 it starts becoming a little tricky because it works only on certain websites.

      Table of contents

      • How can I be secure from MITM attacks?

      Man in the middle attack:

      This is a network-based attack where you become a proxy between the victim and the webpage they are trying to visit. With this setup, you can spy on the traffic on the target activities and network traffic. In this tutorial, we will use zanti to do a man-in-the-middle attack using your android device. 

      So without further ado, let’s start MITM with zanti

      Step 1: Download and install zanti

      You can download zanti from their official website

      Step 2: Scan the network

      When you click on “scan the network” choose all the options if you want in-depth data about each target. Which OS they are using etc.

      Step 3: Review this information

      By reviewing the collected information we can get to know about the network and the devices on the network. Now we can identify the target and do a targeted man in the middle attack on the victim.

      Step 4: Now decide which options you want to use

      While doing a man-in-the-middle attack we need to select certain options. My recommendation is to go for HTTPS redirection only. The rest of them will not be that helpful since they will be easily noticed. However, the following combination will not be detected easily.

      mitm with android

      Step 5: Start MITM attack with zanti

      Click on the start button to begin the MITM attack. As you can see requests will start getting captured.

      mitm with android

      Unfortunately for me my router was very secured and started blocking all connections. Even then I was able to capture some credentials as shown. On routers made before 2019, you will probably be able to capture a lot more information.

      As you see my username and password were captured. This is all it takes to do a MITM attack. Zanti has automated most of the hacking commands making it very easy for anyone to do a man-in-the-middle attack.

      mitm with android

      How can I be secure from MITM attacks?

      • Use security add-ons like “ HTTPS everywhere ” in chrome and firefox browsers. HTTPS Everywhere (Mozilla Firefox) & HTTPS Everywhere (Google Chrome)
      • Update your browser to the latest version
      • Update your OS
      • Use a good antivirus
      • Use Vpn
      • For android devices, you can update them directly from the play store.

      Commonly asked questions about MITM with zanti

      Q1. Is using this attack on public wifi legal?

      No, it is not. It is only for testing purposes. This article is an educational article; please use it with the same intent.

      Q2. Can I hack anyone over the internet?

      No, this attack words when both the attacker and the victim are on the same network.   The same wifi to be more precise.

      Q3. Can I hack android devices with this attack?

      Yes, if the victim is using websites that do not have HTTPS protection then yes you can hack them with this method.

      Cocospy Phone Spy

      Tag:man in the middle attack, mitm, mitm with android, zanti

      • Share:
      author avatar
      shubham

      Previous post

      How to hack android phones with a link (Stagefright exploit)
      February 28, 2021

      Next post

      How to Bypass and Hack Applock - 4 Easy Ways
      February 28, 2021

      You may also like

      top 10 skills every hackers must learn
      Top 10 Skills Every Hacker Must Learn
      8 August, 2021
      pexels-markus-spiske-1921326
      Top 10 Programming Languages for Hacking
      26 June, 2021
      pexels-sora-shimazaki-5926382
      Top 10 Hacking Movies of All Time
      26 June, 2021

      Leave A Reply Cancel reply

      Your email address will not be published. Required fields are marked *

      Cocospy Phone Spy
      Cocospy Phone Spy

      Suggested Tools

      [email protected]
      Facebook Twitter Google-plus Pinterest

      Company

      • About Us
      • Contact
      • Write a Guest Post

      Links

      • Privacy
      • Terms

      Support

      • Disclaimer
      • Advertise With Us
      • FAQs

      All rights Reserved 2021 || For any issues contact: [email protected]

      • Privacy
      • Terms