Search
2 min read
Bluetooth Hacking, January 28-30
Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT...
2,849 views
5 min read
Exploit Development: Fuzzing with American Fuzzy Lop++ (AFL++) to Find Zero-Day Vulnerabilities
Welcome back, my aspiring cyberwarriors! Finding vulnerabilities in applications and services is the first step toward developing your...
1,070 views
4 min read
Bluetooth Hacking, Part 1: Getting Started with Bluetooth
Welcome back, my aspiring cyberwarriors! Today, Bluetooth is built into nearly all our devices and gadgets. These include our ...
75,813 views
5 min read
BlueTooth Hacking, Part 2: BlueTooth Reconnaissance
The beauty of Bluetooth hacking is that it gives you a clear window into the world of the target. Nearly every device has Bluetooth...
40,336 views