



How to Run Recon on Bluetooth Devices with Kali Linux

Full Tutorial: https://nulb.app/z3tpo

Subscribe to Null Byte: https://goo.gl/J6wEnH

Kody’s Twitter: https://twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 138

Bluetooth is a very useful and popular technology that many people use daily but don’t necessarily understand. A hacker can capitalize on this lack of understanding and exploit Bluetooth devices to gather information about a target and the device itself. Today, on this episode of Cyber Weapons Lab, we’ll cover four built-in Kali Linux tools to explore Bluetooth devices.

To learn more, check out the article: https://nulb.app/z3tpo

Follow Null Byte on:

Twitter: https://twitter.com/nullbyte

Flipboard: https://flip.it/3.Gf_0

Website: https://null-byte.com

Weekly newsletter: https://eepurl.com/dE3Ovb

Vimeo: https://vimeo.com/channels/nullbyte



source