This topic contains 1 reply, has 2 voices, and was last updated by n0shmon 3 weeks, 4 days ago.
- April 13, 2021 at 11:04 am #382799
I recently stumbled upon the BlueBorne exploit family. It consists of 8 vonrebilities on all sorts of OS. [https://www.youtube.com/watch?v=LLNtZKpL0P8](https://www.youtube.com/watch?v=LLNtZKpL0P8) [https://www.youtube.com/watch?v=WWQTlogqF1I](https://www.youtube.com/watch?v=WWQTlogqF1I) . If I manage to learn this I will be ready to have some fun hacking some IoT I have laying around 😉 I just don’t understand it all that well. I know there is the script that you have to run when you know the Mac address of the victim, but where can I download it and how excactly do I use it? Heck, is even using premade scripts safe?!
- April 13, 2021 at 11:04 am #382801
Running other people’s exploits is safe, so long as you’ve reviewed the code and understand what it does. Exploits can often be found in the exploit database maintained by OffSec: https://exploit-db.com
Again, even though the database is maintained by a reputable company doesn’t mean there aren’t some bad exploits that get submitted. Ensure you understand what it is you’re running before you run it.
You must be logged in to reply to this topic.