Critical Bluetooth vulnerability CVE-2023-45866

Sdílet
Vložit
  • čas přidán 24. 07. 2024
  • In this video I have explained a critical Bluetooth vulnerability CVE-2023-45866 that allows unauthenticated users to inject keystrokes to vulnerable devices including widely used android devices too. I have demonstrated this vulnerability using a python script: BlueDucky running on Raspberry Pi 5 with it's internal Bluetooth adapter. Impact, affected device, Mitigation and lot more I have explained using few slides and annotation. If You are interested to watch a particular section of this video, below mentioned timestamps can be used to navigate.
    00:00 - Start
    01:27 - Warning ! This video is for educational purposes only
    02:10 - CVE-2023-45866 vulnerability Details
    03:49 - Impact(s) of the vulnerability: CVE-2023-45866
    05:27 - Known affected devices
    06:55 - The actual flaw as per CVE-2023-45866
    07:35 - Initial Setup for BlueDucky
    08:21 - Setup: Using Raspberry Pi 5
    09:01 - Setup: Installing Dependencies and cloning GitHub Repo.
    10:07 - Setup: Installing older version of BlueDucky on Raspberry Pi 5
    12:35 - Running Blueducky on Raspberry Pi 5
    16:06 - Mitigation
    18:40 - Important Information
    Slides and the commands can be downloaded from this Link: bit.ly/3xG0Yvi
    Disclaimer: This video is for informational and educational purposes only. Information security, cybersecurity and ethical hacking is for everyone who is using digital information, smartphones and computers. To protect your information from hackers, you need know how hacking is done. That is why I am sharing my knowledge of such tools on this channel.
    Related Videos on HID attack:
    All about HID and WHID attacks and devices: • All about HID and WHID...
    Learn HID attack on Kali NetHunter | show a fake Windows : • Learn HID attack on Ka...
    Bypass Android lock screen, in case you have forgotten the PIN or pattern : • Bypass Android lock sc...
    testing windows defender security with digispark: • Video
    Follow us on:
    Facebook: / clicksnbits​​
    Instagram: / clicksnbits​​
  • Věda a technologie

Komentáře • 41

  • @ROB9.6
    @ROB9.6 Před 9 dny

    I don't know this. But like to watch such awesome Videos.
    Thank you ji.

  • @maheshpandya8145
    @maheshpandya8145 Před 16 dny +1

    Sir thank you new imfrtion

  • @sravanlucky5337
    @sravanlucky5337 Před 17 dny

    Is it possible to do this directly in Kali Linux after clone the repository

  • @Unknown-User872
    @Unknown-User872 Před 18 dny +2

    Ahmyth install in termux please make a video on this topic install to ho jata hai par payload building fail ho jata hai

  • @headshot_gamingg
    @headshot_gamingg Před 13 dny

    is it work on parrot virtual machine?

  • @brocklezner76
    @brocklezner76 Před 11 dny

    Script not working connection failure likha arha hai

  • @arhamjaved6815
    @arhamjaved6815 Před 4 dny

    Sir hum android k Lia HID script ksa lik Sakta ha a video bna da

  • @hackerbolte5686
    @hackerbolte5686 Před 16 dny

    #Ye hum laptop me Kali se krr skte hai pi tho nhi hai sir

  • @scorpionisready
    @scorpionisready Před 13 dny

    Parsu se try kr rha hu bluez install hi nhi ho rha

  • @anujSingh-st1gs
    @anujSingh-st1gs Před 15 dny +1

    Very interesting

  • @anujSingh-st1gs
    @anujSingh-st1gs Před 13 dny

    Nice vedio sir

  • @Avshack
    @Avshack Před 18 dny

    hello sir at this movement what to give input to start scanning 13:00

    • @ClicksAndBits
      @ClicksAndBits  Před 18 dny

      at the first run, the script will start scanning automatically. After that that you the script will request input from you to take further action.

  • @mayawithrahul
    @mayawithrahul Před 17 dny

    ❤❤❤❤❤❤❤❤ nice 👍

  • @asimchhatar3604
    @asimchhatar3604 Před 4 dny

    Make a video regarding Android rooting 😮😮😮

  • @RishavAggrawal
    @RishavAggrawal Před 18 dny

    Nice Video❤

  • @amarjeetsingh-zo1lw
    @amarjeetsingh-zo1lw Před 18 dny

    sir ssp error aarha h

  • @mrZzz675
    @mrZzz675 Před 15 dny +1

    Sir , Bluetooth device hack kar ke liye Blutooth adaptor lena hota hai kya like Wifi Adapter ya jaise ka video me Raspberry Pi Device me Bluetooth Transmitter/ Recevier Rehta hai Kya Please Clear??

    • @ClicksAndBits
      @ClicksAndBits  Před 15 dny +1

      The inbuilt BT adapter will work

    • @mrZzz675
      @mrZzz675 Před 15 dny

      @@ClicksAndBits Lekin aapne Raspberry Pi Device se blutooth device ck kiya usme bhi pre installed rehta hai kya

  • @xyzking120
    @xyzking120 Před 4 dny

    Sir Android se script run kaise kare

    • @RG_ANIME_STATUS
      @RG_ANIME_STATUS Před 3 dny

      Android nethunter cahiye hoga Android me or 4 se zyada gb ram cahiye hoga Kali nethunter ke liye 👍🏻

  • @subhasishdas3811
    @subhasishdas3811 Před 15 dny +1

    Isme bluetooth adaptar bhi jaroori hain kya

    • @ClicksAndBits
      @ClicksAndBits  Před 14 dny

      no Sir. the internal adapter will do the trick

  • @Mr.r0b07
    @Mr.r0b07 Před 16 dny +1

    Bhai bhut piche chal rha hai.... Kabki videos aa chuki hai iske upar..... Aapka sabun slow h kya

  • @nileshahirwar1453
    @nileshahirwar1453 Před 16 dny

    Please help me sir 🙏🙏🙏🙏

  • @Thecruelworld1966
    @Thecruelworld1966 Před 17 dny +3

    Kal hi maine iske bare me ek article pada tha aur aaj video dekh rha hun 😂😂

    • @ClicksAndBits
      @ClicksAndBits  Před 17 dny

      burning vulnerability

    • @_ArfatFarooq
      @_ArfatFarooq Před 14 dny +1

      Bro does this CVE exploit works without external bluetooth adapters? Also can we use it with inbuilt bluetooth device in Kali Linux(windows internal bluetooth adapter)

  • @nileshahirwar1453
    @nileshahirwar1453 Před 17 dny

    Sir mujhe aapki madad chihiye please sir mera complete data sd card me tha jo ki mere chacha ne chura liya hai or vo mere pariwar ke sath galat karna chahta hai sir mujhe apke help ki jarurat hai please help kijiye sir please 😭😭😭😭😭

  • @RiseAure
    @RiseAure Před 16 dny

    i got that error 2024-07-08 19:11:00,836 - ERROR - Error enabling SSP: Failed to enable SSP
    Traceback (most recent call last):
    File "/home/dark/Documents/Tools/blue/BlueDucky/BlueDucky.py", line 697, in
    main()
    File "/home/dark/Documents/Tools/blue/BlueDucky/BlueDucky.py", line 671, in main
    adapter.enable_ssp()
    File "/home/dark/Documents/Tools/blue/BlueDucky/BlueDucky.py", line 112, in enable_ssp
    raise ConnectionFailureException("Failed to enable SSP")
    ConnectionFailureException: Failed to enable SSP

  • @nitinotavkar6509
    @nitinotavkar6509 Před 9 dny

    Collecting pyobjc (from -r requirements.txt (line 6))
    Using cached pyobjc-10.3.1-py3-none-any.whl.metadata (26 kB)
    ERROR: Exception:
    Traceback (most recent call last):
    File "/home/kali/.local/lib/python3.11/site-packages/pip/_internal/cli/base_command.py", line 179, in exc_logging_wrapper
    status = run_func(*args)

  • @ankitdutt1900
    @ankitdutt1900 Před 11 dny

    Hi sir kya aap shi vidio ko Hindi me banake samja sakte he 😅😅
    czcams.com/video/UCItygRLuBM/video.htmlsi=5YCC6q-pYrermWe5

  • @RishavAggrawal
    @RishavAggrawal Před 18 dny

    Nice Video❤