So we have started on bluejacking and bluesnarfing ...
For for the record there are some devices that are vulnerable to rouge attacks.. but your range needs to be very close for these attacks to work.
Buffer overflow/surge attacks on Bluetooth are fairly common, but generally only apply to IOT devices. There was one of a Bluetooth speaker we have a boat load of fun with, but for bluejacking to work on your phone or pc its pretty hard, and frankly your gonna notice the fella with the laptop on had and him sticking to you like he is glued to your arse, and the best defense dont leave your device discoverable, they then have to guess your mac address. Which means more time with someone glued to your arse.
We tried this on a train once, and on a 4 hour journey we deemed it impractical for most part the reasons I won't get into, but your dealing with everyone else on the train too..... and even in an isolated test its pretty awkward.
What I will say tho is try to avoid IOT devices, as they are built without the ability to be patched you can quickly leave yourself exposed, without even knowing about it
Edit reason - typing on a phone, and auto correct has a fit
I run service bluetooth start and it's work.but whenever i type ble.recon on cmd in bettercap.It's show nothing.So which bluetooth driver i should insatll.Please tell me.My machine is kali linux.
Dude how to recover files and media from local disk c even though it has been formatted because i have formatted to install windows 10 but i lost my files and media in the last OS windows 7 professional
My man, have you heard of devon crawford? The guy found an exploit in google drive, he found out google store everyones files in urls open to everyone.
He made a video about that. Then dissapear. No word from him 1 year and so on.
Love those short tutorials, straight to the point. Keep them coming.
13 likesI was waiting to learn this from you😍
7 likesI feel like I wouldn’t wanna be your neighbour
26 likesSo we have started on bluejacking and bluesnarfing ...
0 likesFor for the record there are some devices that are vulnerable to rouge attacks.. but your range needs to be very close for these attacks to work.
Buffer overflow/surge attacks on Bluetooth are fairly common, but generally only apply to IOT devices. There was one of a Bluetooth speaker we have a boat load of fun with, but for bluejacking to work on your phone or pc its pretty hard, and frankly your gonna notice the fella with the laptop on had and him sticking to you like he is glued to your arse, and the best defense dont leave your device discoverable, they then have to guess your mac address. Which means more time with someone glued to your arse.
We tried this on a train once, and on a 4 hour journey we deemed it impractical for most part the reasons I won't get into, but your dealing with everyone else on the train too..... and even in an isolated test its pretty awkward.
What I will say tho is try to avoid IOT devices, as they are built without the ability to be patched you can quickly leave yourself exposed, without even knowing about it
Edit reason - typing on a phone, and auto correct has a fit
Nicely done explanation
0 likesBruv do you have a online course for all this? Crypto out
7 likesWhich thinkpad are you using . And which one do you recommend?
1 likeman ily your so active with those perfect short videos
3 likesReplies (1)
ila ily ila ily
0 likesgreat teacher
1 likeI run service bluetooth start and it's work.but whenever i type ble.recon on cmd in bettercap.It's show nothing.So which bluetooth driver i should insatll.Please tell me.My machine is kali linux.
0 likesDude how to recover files and media from local disk c even though it has been formatted because i have formatted to install windows 10 but i lost my files and media in the last OS windows 7 professional
1 likeOr simply scan it
0 likes♥️🔥🔥🔥👌💐
0 likesAll parrot os needed is a community
0 likesHey if u ever start teaching cyber security and coding and stuff plz let me know i want to learn from you
1 likeReplies (2)
Yes! This is the best channel
0 likesStraight to the point
Over
No stretching out the vid to 15 min like others
Yup thats the best in him
0 likesMy man, have you heard of devon crawford?
1 likeThe guy found an exploit in google drive, he found out google store everyones files in urls open to everyone.
He made a video about that. Then dissapear.
No word from him 1 year and so on.
Replies (1)
Also no activity on all of his social media
0 likeswhat do you mean of wirte to char to exploit and how can I learn that
0 likes😎😎
0 likesHey since your a hacker what phone do you use
1 likeYour soo underrated
1 likeI swear this like HybridCallistenics from Tik tok. Just dor the brain and hacks
0 likesFirst..!!👍
1 likeHello sir
0 likesBruh I hate hackers lazy bums
0 likes