May 9, 2021

BlueBorne exploits – couple of BILLION vunreablle devices!

wum1DRGHnfjnDeKU73Vu1JAK_owuPd-p1mwXMvnxlE8.jpg

Home Forums BlueBorne exploits – couple of BILLION vunreablle devices!

This topic contains 1 reply, has 2 voices, and was last updated by  n0shmon 3 weeks, 4 days ago.

  • Author
    Posts
  • #382799

    anonymous
    Participant


    Hi,
    I recently stumbled upon the BlueBorne exploit family. It consists of 8 vonrebilities on all sorts of OS. [https://www.youtube.com/watch?v=LLNtZKpL0P8](https://www.youtube.com/watch?v=LLNtZKpL0P8) [https://www.youtube.com/watch?v=WWQTlogqF1I](https://www.youtube.com/watch?v=WWQTlogqF1I) . If I manage to learn this I will be ready to have some fun hacking some IoT I have laying around 😉 I just don’t understand it all that well. I know there is the script that you have to run when you know the Mac address of the victim, but where can I download it and how excactly do I use it? Heck, is even using premade scripts safe?!

    Cheers!

  • #382801

    n0shmon

    Running other people’s exploits is safe, so long as you’ve reviewed the code and understand what it does. Exploits can often be found in the exploit database maintained by OffSec: https://exploit-db.com

    Again, even though the database is maintained by a reputable company doesn’t mean there aren’t some bad exploits that get submitted. Ensure you understand what it is you’re running before you run it.

You must be logged in to reply to this topic.