info
One more demo of how it is possible to spoof Bluetooth device using Kali #NetHunter that might confuse a user when connecting to headphones. Video displays how this technique works and to tell if your smartphone is connected to Bad #Bluetooth device or legit headset. The attack result is HID attack over Bluetooth that injects keystrokes. More info is available in the blog. Link in profile π
Duration: 155 sPosted : Fri, 08 Mar 2024 14:05:28Views
12.2KDaily-
Likes
517Daily-
Comments
18Daily-
Shares
35Daily-
ER
4.67%Daily-
Latest