19 |
20 | 1. Sign & Verify message |
21 | 1. Bluetooth discovery |
22 | 1. Stealing saved wifi password from windows |
23 | 1. Hacking commands with Kali Linux |
24 | 1. Command and Control Trojan |
25 | 1. Dictionary Attack |
26 | 1. Man in Browser Attack |
27 |
28 |
29 |
30 |
31 | 2. SandBox Detection |
32 | 2. Bluetooth SDP browsing |
33 | 2. Sniffing packets |
34 | |
35 | 2. Reverse shell in python |
36 |
37 |
38 |
39 | 3. TCP Proxy |
40 | 3. Bluetooth OBEX |
41 | 3. Email Credential sniffers |
42 | |
43 | 3. Keylogger |
44 |
45 |
46 |
47 | |
48 | 4. Bluetooth RCOMM channel scanner |
49 | |
50 | |
51 | 4. Screenshot with Python |
52 |
53 |
54 |
55 | |
56 | 5. Blue Bug Exploit |
57 | |
58 | |
59 | 5. Backdoor with Python |
60 |
61 |
62 |
63 | |
64 | 6. Blue Snarf Exploit |
65 |
66 |
67 | |
68 | 7. Bluetooth spoofing |
69 |
70 |
71 | |
72 | 8. Bluetooth sniffing |
73 |
74 |
75 |
76 |
77 |