Search
Bluetooth Hacking
2 min read
Bluetooth Hacking, January 28-30
Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT...
2,847 views
5 min read
What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
753 views
3 min read
What is Zigbee and Why is it Used Extensively in SCADA and IoT?
Welcome back, my aspiring cyberwarriors! As our digital world expands to greater and greater physical space, the need for a simple,...
608 views
4 min read
Bluetooth Hacking: Injecting Commands into a Bluetooth Device with BlueDucky
Welcome back, my aspiring cyberwarriors! Bluetooth is a nearly ubiquitous protocol used to communicate between devices in close proximity...
13,474 views
4 min read
Bluetooth Hacking, Part 1: Getting Started with Bluetooth
Welcome back, my aspiring cyberwarriors! Today, Bluetooth is built into nearly all our devices and gadgets. These include our ...
75,807 views
4 min read
Getting Started with Bluetooth Hacking
​ Today, Bluetooth is built into nearly all our gadgets. These include our computers, smartphones, iPods, tablets, speakers, game...
2,472 views
3 min read
Using MultiBlue to Control Any Bluetooth Mobile Device
We recently began an exploration of ways to hack using the Bluetooth protocol. As you know, Bluetooth is a protocol that connects near...
5,232 views
5 min read
BlueTooth Hacking, Part 2: BlueTooth Reconnaissance
The beauty of Bluetooth hacking is that it gives you a clear window into the world of the target. Nearly every device has Bluetooth...
40,336 views
3 min read
Bluetooth Hacking, Part 3: The BlueBourne Exploit
When BlueTooth was first introduced in 1994 by Ericcson Corporation of Sweden, it was very insecure. Hackers could steal information and...
53,122 views