Android Bluetooth Hacking
Android Bluetooth Hacking Tutorial (for educational purposes only)
CVE-2023-45866 allows attackers to remotely control an Android phone (and other devices) without pairing.
Details: Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue. Source: Mitre
See CVE details here:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45866
https://nvd.nist.gov/vuln/detail/CVE-2023-45866
How to stop / mitigate this attack:
1) Upgrade your phone / install security patches on Android for versions 11 and later. Unfortunately earlier versions cannot be patched (Android 10 and earlier)
2) Note: For the script to discover the MAC address of the phone, the phone needs to be in pairing mode.
3) Turn off Bluetooth if not being used
// Script and instructions here //
GitHub: https://github.com/pentestfunctions/BlueDucky
// Occupy The Web Books //
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Occupy The Web SOCIAL //
X: https://twitter.com/three_cube
Website: https://hackers-arise.net/
// GitHub CODE //
https://github.com/pybluez/pybluez
// Amazon LINKS //
Rasberry Pi 5:
US: https://amzn.to/3JZKoZD
UK: https://amzn.to/3JTBixC
ASUS USB/BT-500USB
US: https://amzn.to/4abnPfl
UK: https://amzn.to/3QDsOO
Hacking Wordpress Websites with Python in seconds (using the Dark Web and Telegram data)
00:00 - Bluetooth hacking quick demo
03:05 - Brilliant sponsored segment
03:57 - The Bluetooth vulnerability explained // OccupyTheWeb
05:26 - How the vulnerability works
08:16 - Bluetooth hacking demo
09:26 - Setting up for the hack // BlueZ
12:12 - BlueZ tools demo
13:50 - Scanning for Bluetooth devices
17:58 - Other tools
23:20 - Running BlueDucky // Hacking Bluetooth demo
25:50 - The possibilities of Bluetooth hacking
28:04 - Older Android versions are at risk // Keeping devices up to date
30:17 - Bluetooth hacking for other operating systems
30:52 - Hacking Bluetooth speakers
34:04 - OTW books & plans for future videos
34:52 - Conclusion
android
iphone
bluetooth
raspberry pi
macos
windows
samsung
pixel
google
apple
microsoft
linux
ubuntu
blue tooth
flipper zero
google pixel
ble
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#android #iphone #bluetooth
81
views
How to Gather Info on Someone through OSINT
Digital Sherlock: A Guide to Find Info on People with Open Source Intelligence.
-
// CHAPTERS:
0:00 What is OSINT
0:30 OSINT Example
1:15 Google Dorking
1:47 Finding Documents
2:45 Facial Recognition
2:58 Reverse Image Search
3:26 Find Info on Email
3:51 Searching Social Media Accounts
4:22 Phone Number OSINT
4:35 Intel Techniques
-
// Google Dorks Cheat Sheet
shorturl.at/bdgoE
-
// OSINT Framework
osintframework.com
// Intel Techniques
inteltechniques.com
34
views
Wireless Hacking 1-Getting Started
#wireless #hacking #kali
This video is about configuring the wireless card and setting it up for wireless hacking practical's. It also helps you to make sure that your wireless card is operating properly and helps you to troubleshoot if there are any problems.
13
views
How to hack wifi password? | Hack wifi password using this!! | Like and subscribe
In this informative video, we delve into the world of Wi-Fi hacking techniques, discussing their implications and offering valuable insights on how to safeguard your networks. Please remember that the content shared here is purely for educational purposes. Stay tuned to learn important tips to enhance your network security. Don't forget to like and share this video to help spread awareness!
See Less
OUTLINE:
00:00:00
Introduction
00:00:52
Understanding Wi-Fi Security
00:02:37
Wi-Fi Password Cracking Techniques
00:04:26
More Wi-Fi Password Cracking Techniques
00:06:17
Tools Used By Hackers
00:08:25
Protecting Your Wi-Fi
00:10:16
Conclusion
#hacker #cybersecurity #trending #wifi #cybersecurity #hackingtools #ethicalhacking #hackers #techtips #internetsecurity #digitalsecurity #penetrationtesting #ethicalhacker #networksecurity #cybercrime #datasecurity #cyberattacks #wifitips #onlinesecurity #informationsecurity #itsecurity #computersecurity #hacktivism
48
views
1
comment
Telegram Hacking Tools And Resources For 2024
Dive into the deep end of cyber threat intelligence and offensive security focused groups on Telegram. Beware that a number of these groups might have links to malicious websites so proceed with caution and at your own risk. Offensive tools and techniques provided to be exclusively utilized within the confines of sanctioned penetration tests.
github credits: https://github.com/fastfire/deepdarkCTI
#Telegram #hacking #cyberthreatintelligence #offensivesecurity
31
views
1
comment
Hacking Mobile Phones | Android & iOS | 2024
#termux #pegasus #Mobile
Hacking Mobile Phones | Android & iOS | 2024
77
views
1
comment
ChatGPT For Cybersecurity
In this video, I go over the process of how to use ChatGPT and cover various examples of how to use ChatGPT for Cybersecurity.
ChatGPT is an AI-driven chatbot launched by OpenAI in November 2022.
It is trained using Reinforcement Learning from Human Feedback (RLHF).
It is built on top of OpenAI's GPT-3.5 family of large language models and is fine-tuned with both supervised and reinforcement learning techniques.
OpenAI ChatGPT: https://chat.openai.com/chat
Timestamps:
0:00 Introduction
7:50 ChatGPT usage
10:45 Pentesting examples
13:10 Generating shells
14:25 Fuzzing
17:15 Shellcode
18:00 Custom emails
19:34 Macros
20:56 Buffer overflow
22:15 Automation
25:00 Blue team examples
28:33 ChatGPT impact on cybersecurity
#chatgpt #openai #cybersecurity
41
views
1
comment
EternalBlue Tutorial - Doublepulsar With Metasploit (MS17-010)
Hey guys! HackerSploit her back again with another video, in this video we will be looking at how to use the EternalBlue exploit that was used as part of the worldwide WannaCry ransomware attack.
Module Name: exploit/windows/smb/ms17_010_eternalblue
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
13
views
1
comment
Armitage Kali Linux Complete Tutorial
Hey guys! in this video, we will be looking at how to use Armitage for discovery and exploitation.
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
14
views
1
comment
The Complete Meterpreter Guide | Privilege Escalation & Clearing Tracks
Hey guys! HackerSploit her back again with another Metasploit Meterpreter tutorial, in this video, we will be looking at how to fully utilize the meterpreter for post-exploitation and privilege escalation.
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
<br>
18
views
1
comment
Veil-Evasion Complete Tutorial
Hey guys! HackerSploit here back again with another video, in this video, we will looking at how to generate undetectable payloads with Veil Evasion.
Veil-Evasion is a tool designed to generate metasploit payloads that bypass common anti-virus solutions.
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
15
views
Web Server Hacking - FTP Backdoor Command Execution With Metasploit - #2
Hey guys , in this video we will be hacking/gaining access to the Metasploitable web server
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks as well as my blog.
8
views
Gaining Access - Web Server Hacking - Metasploitable - #1
Hey, guys In this video, we will be continuing the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
------------------------------------------------------
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section
21
views
1
comment
Metasploit For Beginners - #4 - Basic Exploitation
Hey, guys HackerSploit here, back again with another video. In this video, we will be continuing the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
------------------------------------------------------
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section
22
views
2
comments
Metasploit For Beginners - #3 - Information Gathering - Auxiliary Scanners
Hey, guys In this video, we will be continuing the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
------------------------------------------------------
HackerSploit Website: https://hsploit.com/
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section.
27
views
1
comment
Metasploit For Beginners - #2 - Understanding Metasploit Modules
Hey, guys . In this video, we will be starting the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
------------------------------------------------------
HackerSploit Website: https://hsploit.com/
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section.
38
views
1
comment
Metasploit For Beginners - #1 - The Basics - Modules, Exploits & Payloads
Hey, guys In this video, we will be starting the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
I hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section
32
views
1
comment
How to Listen to Phone Calls Using Wireshark Fast And Simple
In this video I demonstrate how to listen to RTP voice streams in Wireshark. I cover how to pick a good capture point on the network, then how to select and listen to the audio stream.
Sample capture can be found here under 'SIP and RTP':
https://wiki.wireshark.org/SampleCaptures#sip-and-rtp
51
views
1
comment
Speed Overkill: How ISPs Sell You Bandwidth Instead of Performance
In this video I demonstrate how ISPs sell you more bandwidth than you actually need, when what you're really looking for is a reliable network which carries your traffic with minimal latency and loss. I dive into the three main factors which make up connection quality (bandwidth, latency and loss), explain why speedtests are almost useless, and show you how to estimate how much bandwidth you actually need. Finally, I preview Netprobe, a simple and effective tool I wrote for monitoring your internet performance at home (and totally free and open source!) Useful links: How Speedtest.net Works https://oneringnetworks.com/bandwidth... Netprobe - https://github.com/plaintextpackets/n...
14
views
1
comment