00:40 🔒 Bluetooth attacks can target basic features of Bluetooth technology applicable to most devices, including DDoS attacks and impersonation attacks. 01:23 🕵 Bluetooth impersonation attacks involve mimicking a trusted device to establish a connection, requiring knowledge of target device information and bypassing security checks. 02:04 🎮 HID spoofing attacks involve mimicking a Bluetooth keyboard to remotely control a target device, often using tools like multi-blue dongle. 02:31 📡 Bluetooth interception attacks intercept traffic between communicating devices, using tools like ubertooth 1 and sniffing software such as Wireshark. 03:00 🛡 Blueborn attacks exploit vulnerabilities in older devices, allowing attackers to take complete control without requiring discoverable mode or pairing. 03:42 🛠 Spoofing tools like SpoofTooth, BT Scanner, and Red Fang are used for scooping devices, extracting information, and discovering hidden Bluetooth devices.
Come on man I feel like you have a course 😂😂 I personally would buy it in full. The way you know you info ℹ️, not many people would give a thorough explanation like you…you got my support
Haha I can assure you it's completely safe. However, if you're hesitant to download, you can view it directly through MEGA's PDF viewer by opening the link.
Congratulations on reaching 100k subscribers! Your dedication,hard work and content have truly paid off. Here's to many more milestones ahead! InshaAllah ❤
bro this is what we want the hack tricks that we dont know about you're become great in every videos keep it up and you're not the same as like they who post same shit repeat💓
Hey I understand the AI voice for your channel and think it’s one of those rare exceptions that deserves to use it, due to its theming but you should revamp it a bit. Text to speech never encapsulates proper human speech so you should record your own voice then process it locally through an AI to match the tts voice in your videos. This is assuming of course you have the processing power to do so. Personally, I use the okada realtime voice changer to mess with my friends, however, I feel it would have a large impact on content quality. If it also helps, train a model of the text to speech voice you use.
hi , thanks for your effort to post such unaccessible information and I'm curious to learn hacking , just I'd to know if it's possible "where to start? " and I hope having a nice day !
@@mtthsgrr what do you mean I'm just trying to give good advice look at all the other thumbnail pictures and they look good compare it to this one it looks bad
Hey man, can you make a vid on partial emails/phone numbers? I found a partial icloud from forgot password with a phone no. but am clueless on what to do next
I often wonder if advast and other antivirus and data protection companies and the police know about these problems and attacks Know I ask you could this be used to hack an app such as sage hr ?
I can't learn coding, I don't understand the internet, and I can't stick to my own plans and studies. I get bored and quit after a while. Please help me.
Build good studying habits, and make sure to also build commitment and discipline. This goes for all aspects of life. Lastly, you need a purpose, why are you doing this? This is a question that you can only answer yourself.
@@Ertyu20stick to mastering one thing. I spoke to a production manager once 200k+ salary. He once told me “ you can be a jack of all trades or master of one “. I know in martial arts you master your dojo ( black belt status ) and go to a new one for a new challenge.
hello Ali and greeting from Afghanistan i recommend that we need full info about malware and how to create if you provide for me that would be great .......Haidari
Bro how to use dark web for free ethical hacking resource. Try to get website but I cant reached. Can you mack video how to use dark web and how to access free resource on it
I have a video lined up on the dark web and will try to include a segment related to this. However, I wouldn't recommend downloading any files from there, no matter how professional a website might seem...
@@an0n_aliyes bro It is harmful to download from dark web. But I want to free resource to learn ethical hacking. I exploring dark web on bootable kali but I bot understand how that works and how I find any links. Mack video what is the harm on dark web and how to use(like finding new link hosting secure web on dark etc.........)
Guy makes a video to ask downloading a file, which could be literally be included in the video..... nothing sus here.... better than hacking is social engineering, why crack a password when you can ask for it. dont download nothing.
Thank you all for 100k subs
Virus
Hey we need a telegram channel or dicord server from you
yes
I want to download it , but I am scared to do so
same , how can we trust a bot voice@@tejassharma1849
i super appreciate your videos, im learning more in these 5 minutes than i do in months and years of reading documentations
This voice to speech is much more easy to listen to then every other text to speech these days. Thank you.
00:40 🔒 Bluetooth attacks can target basic features of Bluetooth technology applicable to most devices, including DDoS attacks and impersonation attacks.
01:23 🕵 Bluetooth impersonation attacks involve mimicking a trusted device to establish a connection, requiring knowledge of target device information and bypassing security checks.
02:04 🎮 HID spoofing attacks involve mimicking a Bluetooth keyboard to remotely control a target device, often using tools like multi-blue dongle.
02:31 📡 Bluetooth interception attacks intercept traffic between communicating devices, using tools like ubertooth 1 and sniffing software such as Wireshark.
03:00 🛡 Blueborn attacks exploit vulnerabilities in older devices, allowing attackers to take complete control without requiring discoverable mode or pairing.
03:42 🛠 Spoofing tools like SpoofTooth, BT Scanner, and Red Fang are used for scooping devices, extracting information, and discovering hidden Bluetooth devices.
Come on man I feel like you have a course 😂😂 I personally would buy it in full. The way you know you info ℹ️, not many people would give a thorough explanation like you…you got my support
Working on a project that I'll share soon ;) Stay tuned!
Awesome 👏🏾 your definitely my mentor for my cybersecurity career
@@an0n_ali Pls launch that course asap
@@an0n_aliall I need is instructions to ddos speakers
@an0n_ali did u get that project done yet
I'm afraid to download your pdf..
Haha I can assure you it's completely safe. However, if you're hesitant to download, you can view it directly through MEGA's PDF viewer by opening the link.
@@an0n_ali XD I'm always hesitant to download things, love the videos though. 💪
Scan the link for an fouls things that might be hidden within the link
😂😂😂
Upload camera hacking @@an0n_ali
Congratulations on reaching 100k subscribers! Your dedication,hard work and content have truly paid off. Here's to many more milestones ahead! InshaAllah ❤
thank you for the kind words 🖤
TYSM your my new favorite ytber❤
I have no idea how can I use this but I am perplexed and admire your content, still
bro this is what we want the hack tricks that we dont know about you're become great in every videos keep it up and you're not the same as like they who post same shit repeat💓
Hey I understand the AI voice for your channel and think it’s one of those rare exceptions that deserves to use it, due to its theming but you should revamp it a bit. Text to speech never encapsulates proper human speech so you should record your own voice then process it locally through an AI to match the tts voice in your videos. This is assuming of course you have the processing power to do so. Personally, I use the okada realtime voice changer to mess with my friends, however, I feel it would have a large impact on content quality. If it also helps, train a model of the text to speech voice you use.
Cringe.
@@mtganalytic9796 what's cringe?
Thx, I have a suggestion **Can You Make A Full Cyber security COURSE**
I was waiting for a video on this topic, thank you👍
hi , thanks for your effort to post such unaccessible information and I'm curious to learn hacking , just I'd to know if it's possible "where to start? " and I hope having a nice day !
You're goated, thanks for the content
Bro aint no way i clicking on links in your description. Nuu uuhhhh
Love your content ❤
Nice video but please stick to your original thumbnail pictures that AI picture doesn't look good
what's wrong with you
@@mtthsgrr what do you mean I'm just trying to give good advice look at all the other thumbnail pictures and they look good compare it to this one it looks bad
@@mtthsgrr quit being soft I didn't say nothing disrespectful
@@HellHound___0W hellhund
I totally agree. What do you think about the new one?
You are my inspiration how can I make videos like you sir ❤❤❤❤❤
Why you didn't talk abt Blue Jacking? I thought you surely will call it out
it would be great if you made a video about how to get info on "no caller id" numbers, if there can info about it...
Congrats on 100k 🎉
So, is there a way to protect against these attacks for the innocent me who just wants to listen to music through my Bluetooth headset? 😂😢
someone is going to play mr trololo on your headphonesXD
@@Snooopy28 good choice bro! :D
@@musabucak thanks man:D my favourite flavor of comic mischief:D
You should write a book on hacking.
does your pdf has a backdoor or trojan ???
yes virus
could you do a video talking about the whoami tool?
Hey man, can you make a vid on partial emails/phone numbers? I found a partial icloud from forgot password with a phone no. but am clueless on what to do next
I often wonder if advast and other antivirus and data protection companies and the police know about these problems and attacks
Know I ask you could this be used to hack an app such as sage hr ?
Nice bro and you provide extra notes in pdf
i have a question how to do you use UA-cam and instgram anonymously?
How do I know if I'm affected? Someone hacked into my Xiaomi account and I believe it was through Bluetooth
You should upload videos on some diffetent platform that allows hacking cintent unlike youtube where we can only talk theory
You are a legend . Keep up the hard work
.....
Hey can i use this to disconnect Bluetooth device permanently?
Thx for ur video. Could u speak about tails 6.0 cuz this version look not very like other and maybe spy version
I can't learn coding, I don't understand the internet, and I can't stick to my own plans and studies. I get bored and quit after a while. Please help me.
Build good studying habits, and make sure to also build commitment and discipline. This goes for all aspects of life. Lastly, you need a purpose, why are you doing this? This is a question that you can only answer yourself.
@@Ilovenazism im curious about how computers work, both software and hardware.learning coding is my first step.
@@Ertyu20stick to mastering one thing. I spoke to a production manager once 200k+ salary. He once told me “ you can be a jack of all trades or master of one “. I know in martial arts you master your dojo ( black belt status ) and go to a new one for a new challenge.
Hey,all my devices have been hacked. How could I get ahold of you? I’ll pay you to protect my electronics!
Hi I'm trying to download hydra on termux but it says "pkg hydra not found" can you help:)
Hii bro how to start your hacking field , and how to you build your skills . I asking because it may be base fore us.............
What are you, in the 6th grade?
hello Ali and greeting from Afghanistan i recommend that we need full info about malware and how to create if you provide for me that would be great .......Haidari
Didn't say anything.
Good ass information for free. Thanks man!
3:02 hacking medical equipment 💀
Lol
Another one. Present!
New subscriber here.
Hello am new to hacking, what should I learn first?
You have to learn linux
@@13as4klu08 I already have it installed and know the basics of it, like LS command etc.
👏👏👏
Good 👍
great video
keep going, I beg
Bro how to use dark web for free ethical hacking resource. Try to get website but I cant reached. Can you mack video how to use dark web and how to access free resource on it
I have a video lined up on the dark web and will try to include a segment related to this. However, I wouldn't recommend downloading any files from there, no matter how professional a website might seem...
@@an0n_aliyes bro It is harmful to download from dark web. But I want to free resource to learn ethical hacking. I exploring dark web on bootable kali but I bot understand how that works and how I find any links. Mack video what is the harm on dark web and how to use(like finding new link hosting secure web on dark etc.........)
Good video 👀
you should really create like a full course on hacking lol
What is bluetooth hacking
😮😮
Kannst du deutsch?
Why use voice mod when we just need to have devs patch this
Ward driving❤
amazing video 🙏🙏👍👍👍👍👍love it
Keep it up
nice
Guy makes a video to ask downloading a file, which could be literally be included in the video..... nothing sus here.... better than hacking is social engineering, why crack a password when you can ask for it.
dont download nothing.
Video very nice but voice is dirty
Do you hace any telegram Chanel?
Nope, but I'll launch one soon.
Plz
I am a snarf
Love You
W editing
❤
I was just thinking abott it tht lmao
lmao, this is video cre from AI :)))
First cmt.
First command under first command
ترجمة عربية
Kali linux
Blooover
Your voice is free dude
Why do this
Subarashi
I love you video 🎉❤
luv ya