Search


4 min read
Bluetooth Hacking: Using Bettercap for BLE Reconnaissance and Attacks!
Welcome back, my aspiring cyberwarriors! Bluetooth is the most underappreciated attack vector into all your devices. Nearly all our...
391 views


2 min read
Bluetooth Hacking, January 28-30
Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT...
3,505 views

5 min read
Exploit Development: Fuzzing with American Fuzzy Lop++ (AFL++) to Find Zero-Day Vulnerabilities
Welcome back, my aspiring cyberwarriors! Finding vulnerabilities in applications and services is the first step toward developing your...
1,251 views


4 min read
Bluetooth Hacking, Part 1: Getting Started with Bluetooth
Welcome back, my aspiring cyberwarriors! Today, Bluetooth is built into nearly all our devices and gadgets. These include our ...
76,080 views


5 min read
BlueTooth Hacking, Part 2: BlueTooth Reconnaissance
The beauty of Bluetooth hacking is that it gives you a clear window into the world of the target. Nearly every device has Bluetooth...
40,409 views