Search
Bluetooth Hacking
Bluetooth is a common attack vector for unauthorized access, data theft, and surveillance. Mastering Bluetooth hacking ensures security engineers and pentesters can identify weaknesses, develop countermeasures, and ensure the safety of personal and organizational data.


Bluetooth Hacking: Using Bettercap for BLE Reconnaissance and Attacks!
Welcome back, my aspiring cyberwarriors! Bluetooth is the most underappreciated attack vector into all your devices. Nearly all our...
4 min read
1,113 views


Bluetooth Hacking, January 28-30
Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT...
2 min read
3,824 views


What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
5 min read
970 views


What is Zigbee and Why is it Used Extensively in SCADA and IoT?
Welcome back, my aspiring cyberwarriors! As our digital world expands to greater and greater physical space, the need for a simple,...
3 min read
848 views


Bluetooth Hacking: Injecting Commands into a Bluetooth Device with BlueDucky
Welcome back, my aspiring cyberwarriors! Bluetooth is a nearly ubiquitous protocol used to communicate between devices in close proximity...
4 min read
14,504 views


Bluetooth Hacking, Part 1: Getting Started with Bluetooth
Welcome back, my aspiring cyberwarriors! Today, Bluetooth is built into nearly all our devices and gadgets. These include our ...
4 min read
76,825 views


Getting Started with Bluetooth Hacking
​ Today, Bluetooth is built into nearly all our gadgets. These include our computers, smartphones, iPods, tablets, speakers, game...
4 min read
2,554 views


Using MultiBlue to Control Any Bluetooth Mobile Device
We recently began an exploration of ways to hack using the Bluetooth protocol. As you know, Bluetooth is a protocol that connects near...
3 min read
5,532 views


BlueTooth Hacking, Part 2: BlueTooth Reconnaissance
The beauty of Bluetooth hacking is that it gives you a clear window into the world of the target. Nearly every device has Bluetooth...
5 min read
40,596 views


Bluetooth Hacking, Part 3: The BlueBourne Exploit
When BlueTooth was first introduced in 1994 by Ericcson Corporation of Sweden, it was very insecure. Hackers could steal information and...
3 min read
53,516 views