Introduction to BLUETOOTH HACKING!
ฝัง
- เผยแพร่เมื่อ 29 มิ.ย. 2024
- Cybersecurity 101: Bluetooth Security
-
// CHAPTERS:
0:00 Intro
0:30 Stage Number I
1:05 BT DDoS
1:30 BT Impersonation
1:53 HID Spoofing
2:19 BT Interception
2:47 BlueBorne
3:24 Stage Number II
-
Disclaimer: This video solely focuses on the attacks carried out by hackers to compromise Bluetooth devices and DOES NOT provide a step-by-step guide on how to execute them. Blackhat hacking is highly discouraged and can result in serious legal consequences.
-
PDF DOWNLOAD: mega.nz/file/dHtFnYBS#KGU2450...
-
// Follow Me:
Instagram: an0n.ali
Odysee: www.odysee.com/@an0n.ali:8 - วิทยาศาสตร์และเทคโนโลยี
Thank you all for 100k subs
Virus
Hey we need a telegram channel or dicord server from you
yes
I want to download it , but I am scared to do so
same , how can we trust a bot voice@@tejassharma1849
i super appreciate your videos, im learning more in these 5 minutes than i do in months and years of reading documentations
00:40 🔒 Bluetooth attacks can target basic features of Bluetooth technology applicable to most devices, including DDoS attacks and impersonation attacks.
01:23 🕵 Bluetooth impersonation attacks involve mimicking a trusted device to establish a connection, requiring knowledge of target device information and bypassing security checks.
02:04 🎮 HID spoofing attacks involve mimicking a Bluetooth keyboard to remotely control a target device, often using tools like multi-blue dongle.
02:31 📡 Bluetooth interception attacks intercept traffic between communicating devices, using tools like ubertooth 1 and sniffing software such as Wireshark.
03:00 🛡 Blueborn attacks exploit vulnerabilities in older devices, allowing attackers to take complete control without requiring discoverable mode or pairing.
03:42 🛠 Spoofing tools like SpoofTooth, BT Scanner, and Red Fang are used for scooping devices, extracting information, and discovering hidden Bluetooth devices.
bro this is what we want the hack tricks that we dont know about you're become great in every videos keep it up and you're not the same as like they who post same shit repeat💓
Come on man I feel like you have a course 😂😂 I personally would buy it in full. The way you know you info ℹ️, not many people would give a thorough explanation like you…you got my support
Working on a project that I'll share soon ;) Stay tuned!
Awesome 👏🏾 your definitely my mentor for my cybersecurity career
@@an0n_ali Pls launch that course asap
@@an0n_aliall I need is instructions to ddos speakers
I was waiting for a video on this topic, thank you👍
TYSM your my new favorite ytber❤
Love your content ❤
You're goated, thanks for the content
Congrats on 100k 🎉
Congratulations on reaching 100k subscribers! Your dedication,hard work and content have truly paid off. Here's to many more milestones ahead! InshaAllah ❤
thank you for the kind words 🖤
You are a legend . Keep up the hard work
.....
I'm afraid to download your pdf..
Haha I can assure you it's completely safe. However, if you're hesitant to download, you can view it directly through MEGA's PDF viewer by opening the link.
@@an0n_ali XD I'm always hesitant to download things, love the videos though. 💪
Scan the link for an fouls things that might be hidden within the link
😂😂😂
Upload camera hacking @@an0n_ali
Nice bro and you provide extra notes in pdf
Good video 👀
I have no idea how can I use this but I am perplexed and admire your content, still
Thx, I have a suggestion **Can You Make A Full Cyber security COURSE**
Hey I understand the AI voice for your channel and think it’s one of those rare exceptions that deserves to use it, due to its theming but you should revamp it a bit. Text to speech never encapsulates proper human speech so you should record your own voice then process it locally through an AI to match the tts voice in your videos. This is assuming of course you have the processing power to do so. Personally, I use the okada realtime voice changer to mess with my friends, however, I feel it would have a large impact on content quality. If it also helps, train a model of the text to speech voice you use.
Cringe.
@@mtganalytic9796 what's cringe?
great video
Good 👍
Another one. Present!
Bro aint no way i clicking on links in your description. Nuu uuhhhh
Good ass information for free. Thanks man!
Keep it up
You are my inspiration how can I make videos like you sir ❤❤❤❤❤
👏👏👏
New subscriber here.
Love You
W editing
hi , thanks for your effort to post such unaccessible information and I'm curious to learn hacking , just I'd to know if it's possible "where to start? " and I hope having a nice day !
nice
it would be great if you made a video about how to get info on "no caller id" numbers, if there can info about it...
Thx for ur video. Could u speak about tails 6.0 cuz this version look not very like other and maybe spy version
You should write a book on hacking.
keep going, I beg
Hey man, can you make a vid on partial emails/phone numbers? I found a partial icloud from forgot password with a phone no. but am clueless on what to do next
❤
Ward driving❤
amazing video 🙏🙏👍👍👍👍👍love it
You should upload videos on some diffetent platform that allows hacking cintent unlike youtube where we can only talk theory
Didn't say anything.
3:02 hacking medical equipment 💀
Lol
could you do a video talking about the whoami tool?
Why you didn't talk abt Blue Jacking? I thought you surely will call it out
So, is there a way to protect against these attacks for the innocent me who just wants to listen to music through my Bluetooth headset? 😂😢
someone is going to play mr trololo on your headphonesXD
@@Snooopy28 good choice bro! :D
@@musabucak thanks man:D my favourite flavor of comic mischief:D
I often wonder if advast and other antivirus and data protection companies and the police know about these problems and attacks
Know I ask you could this be used to hack an app such as sage hr ?
First cmt.
First command under first command
i have a question how to do you use TH-cam and instgram anonymously?
Nice video but please stick to your original thumbnail pictures that AI picture doesn't look good
what's wrong with you
@@mtthsgrr what do you mean I'm just trying to give good advice look at all the other thumbnail pictures and they look good compare it to this one it looks bad
@@mtthsgrr quit being soft I didn't say nothing disrespectful
@@HellHound___0W hellhund
I totally agree. What do you think about the new one?
hello Ali and greeting from Afghanistan i recommend that we need full info about malware and how to create if you provide for me that would be great .......Haidari
I love you video 🎉❤
you should really create like a full course on hacking lol
Hi I'm trying to download hydra on termux but it says "pkg hydra not found" can you help:)
Hii bro how to start your hacking field , and how to you build your skills . I asking because it may be base fore us.............
What are you, in the 6th grade?
does your pdf has a backdoor or trojan ???
yes virus
Hey,all my devices have been hacked. How could I get ahold of you? I’ll pay you to protect my electronics!
What is bluetooth hacking
I can't learn coding, I don't understand the internet, and I can't stick to my own plans and studies. I get bored and quit after a while. Please help me.
Build good studying habits, and make sure to also build commitment and discipline. This goes for all aspects of life. Lastly, you need a purpose, why are you doing this? This is a question that you can only answer yourself.
@@Ilovenazism im curious about how computers work, both software and hardware.learning coding is my first step.
@@Ertyu20stick to mastering one thing. I spoke to a production manager once 200k+ salary. He once told me “ you can be a jack of all trades or master of one “. I know in martial arts you master your dojo ( black belt status ) and go to a new one for a new challenge.
I was just thinking abott it tht lmao
Hello am new to hacking, what should I learn first?
You have to learn linux
@@13as4klu08 I already have it installed and know the basics of it, like LS command etc.
Kali linux
Your voice is free dude
Why do this
Bro how to use dark web for free ethical hacking resource. Try to get website but I cant reached. Can you mack video how to use dark web and how to access free resource on it
I have a video lined up on the dark web and will try to include a segment related to this. However, I wouldn't recommend downloading any files from there, no matter how professional a website might seem...
@@an0n_aliyes bro It is harmful to download from dark web. But I want to free resource to learn ethical hacking. I exploring dark web on bootable kali but I bot understand how that works and how I find any links. Mack video what is the harm on dark web and how to use(like finding new link hosting secure web on dark etc.........)
ترجمة عربية
Do you hace any telegram Chanel?
Nope, but I'll launch one soon.
Plz
Blooover
Kannst du deutsch?
lmao, this is video cre from AI :)))
Subarashi
luv ya