Cyber security

Using Hardware -Based Exploits : A Comprehensive Guide To Braktooth, Internalblue, And Automated Techniques

You need to buy the following hardware to be able to run the exploits: The installation is partially automated in the toolkit. Consult repository for other information.

Once you have needed hardware:

  • you need to connect it to your machine
  • Then run the following command
ls -la /dev/tty*
  • If you see /dev/ttyUSB0 and /dev/ttyUSB1 then the development board is connected and you can start writing to it
  • To continue Braktooth installation run the following commands
chmod +x /usr/share/Btoolkit/installation/braktooth_additional_install.sh
/usr/share/Btoolkit/installation/braktooth_additional_install.sh

Internalblue

Currently, we support only Nexus 5 phones, but you can add your hardware that supports internalblue as well LINK_TO_HOW_TO_ADD_HARDWARE.

The phone should already be set up according to Internalblue recommendations

On the first run, you might need to allow adb to debug your device and then install a BluetoothAssistant on your mobile device.

Useful commands:

  • would list devices (if needed change your user to root)
adb devices

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

17 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

17 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

17 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

17 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

17 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

20 hours ago