Search
Bluetooth Hacking
Bluetooth is a common attack vector for unauthorized access, data theft, and surveillance. Mastering Bluetooth hacking ensures security engineers and pentesters can identify weaknesses, develop countermeasures, and ensure the safety of personal and organizational data.


4 min read
Bluetooth Hacking: Using Bettercap for BLE Reconnaissance and Attacks!
Welcome back, my aspiring cyberwarriors! Bluetooth is the most underappreciated attack vector into all your devices. Nearly all our...
533 views


2 min read
Bluetooth Hacking, January 28-30
Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT...
3,569 views

5 min read
What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
854 views


3 min read
What is Zigbee and Why is it Used Extensively in SCADA and IoT?
Welcome back, my aspiring cyberwarriors! As our digital world expands to greater and greater physical space, the need for a simple,...
685 views


4 min read
Bluetooth Hacking: Injecting Commands into a Bluetooth Device with BlueDucky
Welcome back, my aspiring cyberwarriors! Bluetooth is a nearly ubiquitous protocol used to communicate between devices in close proximity...
14,003 views


4 min read
Bluetooth Hacking, Part 1: Getting Started with Bluetooth
Welcome back, my aspiring cyberwarriors! Today, Bluetooth is built into nearly all our devices and gadgets. These include our ...
76,171 views


4 min read
Getting Started with Bluetooth Hacking
​ Today, Bluetooth is built into nearly all our gadgets. These include our computers, smartphones, iPods, tablets, speakers, game...
2,502 views


3 min read
Using MultiBlue to Control Any Bluetooth Mobile Device
We recently began an exploration of ways to hack using the Bluetooth protocol. As you know, Bluetooth is a protocol that connects near...
5,334 views


5 min read
BlueTooth Hacking, Part 2: BlueTooth Reconnaissance
The beauty of Bluetooth hacking is that it gives you a clear window into the world of the target. Nearly every device has Bluetooth...
40,441 views


3 min read
Bluetooth Hacking, Part 3: The BlueBourne Exploit
When BlueTooth was first introduced in 1994 by Ericcson Corporation of Sweden, it was very insecure. Hackers could steal information and...
53,299 views