Переглядів 288,851
How to Run Recon on Bluetooth Devices with Kali Linux
Full Tutorial: nulb.app/z3tpo
Subscribe to Null Byte: goo.gl/J6wEnH
Kody's Twitter: / kodykinzie
Cyber Weapons Lab, Episode 138
Bluetooth is a very useful and popular technology that many people use daily but don't necessarily understand. A hacker can capitalize on this lack of understanding and exploit Bluetooth devices to gather information about a target and the device itself. Today, on this episode of Cyber Weapons Lab, we'll cover four built-in Kali Linux tools to explore Bluetooth devices.
To learn more, check out the article: nulb.app/z3tpo
Follow Null Byte on:
Twitter: / nullbyte
Flipboard: flip.it/3.Gf_0
Website: null-byte.com
Weekly newsletter: eepurl.com/dE3Ovb
Vimeo: vimeo.com/channels/nullbyte