Haha I can assure you it's completely safe. However, if you're hesitant to download, you can view it directly through MEGA's PDF viewer by opening the link.
Come on man I feel like you have a course 😂😂 I personally would buy it in full. The way you know you info ℹ️, not many people would give a thorough explanation like you…you got my support
00:40 🔒 Bluetooth attacks can target basic features of Bluetooth technology applicable to most devices, including DDoS attacks and impersonation attacks. 01:23 🕵 Bluetooth impersonation attacks involve mimicking a trusted device to establish a connection, requiring knowledge of target device information and bypassing security checks. 02:04 🎮 HID spoofing attacks involve mimicking a Bluetooth keyboard to remotely control a target device, often using tools like multi-blue dongle. 02:31 📡 Bluetooth interception attacks intercept traffic between communicating devices, using tools like ubertooth 1 and sniffing software such as Wireshark. 03:00 🛡 Blueborn attacks exploit vulnerabilities in older devices, allowing attackers to take complete control without requiring discoverable mode or pairing. 03:42 🛠 Spoofing tools like SpoofTooth, BT Scanner, and Red Fang are used for scooping devices, extracting information, and discovering hidden Bluetooth devices.
Congratulations on reaching 100k subscribers! Your dedication,hard work and content have truly paid off. Here's to many more milestones ahead! InshaAllah ❤
Hey I understand the AI voice for your channel and think it’s one of those rare exceptions that deserves to use it, due to its theming but you should revamp it a bit. Text to speech never encapsulates proper human speech so you should record your own voice then process it locally through an AI to match the tts voice in your videos. This is assuming of course you have the processing power to do so. Personally, I use the okada realtime voice changer to mess with my friends, however, I feel it would have a large impact on content quality. If it also helps, train a model of the text to speech voice you use.
bro this is what we want the hack tricks that we dont know about you're become great in every videos keep it up and you're not the same as like they who post same shit repeat💓
@@mtthsgrr what do you mean I'm just trying to give good advice look at all the other thumbnail pictures and they look good compare it to this one it looks bad
hi , thanks for your effort to post such unaccessible information and I'm curious to learn hacking , just I'd to know if it's possible "where to start? " and I hope having a nice day !
I can't learn coding, I don't understand the internet, and I can't stick to my own plans and studies. I get bored and quit after a while. Please help me.
Build good studying habits, and make sure to also build commitment and discipline. This goes for all aspects of life. Lastly, you need a purpose, why are you doing this? This is a question that you can only answer yourself.
@@Ertyu20stick to mastering one thing. I spoke to a production manager once 200k+ salary. He once told me “ you can be a jack of all trades or master of one “. I know in martial arts you master your dojo ( black belt status ) and go to a new one for a new challenge.
I often wonder if advast and other antivirus and data protection companies and the police know about these problems and attacks Know I ask you could this be used to hack an app such as sage hr ?
Hey man, can you make a vid on partial emails/phone numbers? I found a partial icloud from forgot password with a phone no. but am clueless on what to do next
hello Ali and greeting from Afghanistan i recommend that we need full info about malware and how to create if you provide for me that would be great .......Haidari
Bro how to use dark web for free ethical hacking resource. Try to get website but I cant reached. Can you mack video how to use dark web and how to access free resource on it
I have a video lined up on the dark web and will try to include a segment related to this. However, I wouldn't recommend downloading any files from there, no matter how professional a website might seem...
@@an0n_aliyes bro It is harmful to download from dark web. But I want to free resource to learn ethical hacking. I exploring dark web on bootable kali but I bot understand how that works and how I find any links. Mack video what is the harm on dark web and how to use(like finding new link hosting secure web on dark etc.........)
Thank you all for 100k subs
Virus
Hey we need a telegram channel or dicord server from you
yes
I want to download it , but I am scared to do so
same , how can we trust a bot voice@@tejassharma1849
I'm afraid to download your pdf..
Haha I can assure you it's completely safe. However, if you're hesitant to download, you can view it directly through MEGA's PDF viewer by opening the link.
@@an0n_ali XD I'm always hesitant to download things, love the videos though. 💪
Scan the link for an fouls things that might be hidden within the link
😂😂😂
Upload camera hacking @@an0n_ali
Come on man I feel like you have a course 😂😂 I personally would buy it in full. The way you know you info ℹ️, not many people would give a thorough explanation like you…you got my support
Working on a project that I'll share soon ;) Stay tuned!
Awesome 👏🏾 your definitely my mentor for my cybersecurity career
@@an0n_ali Pls launch that course asap
@@an0n_aliall I need is instructions to ddos speakers
00:40 🔒 Bluetooth attacks can target basic features of Bluetooth technology applicable to most devices, including DDoS attacks and impersonation attacks.
01:23 🕵 Bluetooth impersonation attacks involve mimicking a trusted device to establish a connection, requiring knowledge of target device information and bypassing security checks.
02:04 🎮 HID spoofing attacks involve mimicking a Bluetooth keyboard to remotely control a target device, often using tools like multi-blue dongle.
02:31 📡 Bluetooth interception attacks intercept traffic between communicating devices, using tools like ubertooth 1 and sniffing software such as Wireshark.
03:00 🛡 Blueborn attacks exploit vulnerabilities in older devices, allowing attackers to take complete control without requiring discoverable mode or pairing.
03:42 🛠 Spoofing tools like SpoofTooth, BT Scanner, and Red Fang are used for scooping devices, extracting information, and discovering hidden Bluetooth devices.
i super appreciate your videos, im learning more in these 5 minutes than i do in months and years of reading documentations
Congratulations on reaching 100k subscribers! Your dedication,hard work and content have truly paid off. Here's to many more milestones ahead! InshaAllah ❤
thank you for the kind words 🖤
Hey I understand the AI voice for your channel and think it’s one of those rare exceptions that deserves to use it, due to its theming but you should revamp it a bit. Text to speech never encapsulates proper human speech so you should record your own voice then process it locally through an AI to match the tts voice in your videos. This is assuming of course you have the processing power to do so. Personally, I use the okada realtime voice changer to mess with my friends, however, I feel it would have a large impact on content quality. If it also helps, train a model of the text to speech voice you use.
Cringe.
@@mtganalytic9796 what's cringe?
Bro aint no way i clicking on links in your description. Nuu uuhhhh
I have no idea how can I use this but I am perplexed and admire your content, still
bro this is what we want the hack tricks that we dont know about you're become great in every videos keep it up and you're not the same as like they who post same shit repeat💓
Nice video but please stick to your original thumbnail pictures that AI picture doesn't look good
what's wrong with you
@@mtthsgrr what do you mean I'm just trying to give good advice look at all the other thumbnail pictures and they look good compare it to this one it looks bad
@@mtthsgrr quit being soft I didn't say nothing disrespectful
@@HellHound___0W hellhund
I totally agree. What do you think about the new one?
Why you didn't talk abt Blue Jacking? I thought you surely will call it out
So, is there a way to protect against these attacks for the innocent me who just wants to listen to music through my Bluetooth headset? 😂😢
someone is going to play mr trololo on your headphonesXD
@@Snooopy28 good choice bro! :D
@@musabucak thanks man:D my favourite flavor of comic mischief:D
TYSM your my new favorite ytber❤
How do I know if I'm affected? Someone hacked into my Xiaomi account and I believe it was through Bluetooth
hi , thanks for your effort to post such unaccessible information and I'm curious to learn hacking , just I'd to know if it's possible "where to start? " and I hope having a nice day !
Thx, I have a suggestion **Can You Make A Full Cyber security COURSE**
I was waiting for a video on this topic, thank you👍
Love your content ❤
does your pdf has a backdoor or trojan ???
yes virus
Hey,all my devices have been hacked. How could I get ahold of you? I’ll pay you to protect my electronics!
You're goated, thanks for the content
Congrats on 100k 🎉
I can't learn coding, I don't understand the internet, and I can't stick to my own plans and studies. I get bored and quit after a while. Please help me.
Build good studying habits, and make sure to also build commitment and discipline. This goes for all aspects of life. Lastly, you need a purpose, why are you doing this? This is a question that you can only answer yourself.
@@Ilovenazism im curious about how computers work, both software and hardware.learning coding is my first step.
@@Ertyu20stick to mastering one thing. I spoke to a production manager once 200k+ salary. He once told me “ you can be a jack of all trades or master of one “. I know in martial arts you master your dojo ( black belt status ) and go to a new one for a new challenge.
Didn't say anything.
it would be great if you made a video about how to get info on "no caller id" numbers, if there can info about it...
You are a legend . Keep up the hard work
.....
I often wonder if advast and other antivirus and data protection companies and the police know about these problems and attacks
Know I ask you could this be used to hack an app such as sage hr ?
3:02 hacking medical equipment 💀
Lol
You should write a book on hacking.
You are my inspiration how can I make videos like you sir ❤❤❤❤❤
You should upload videos on some diffetent platform that allows hacking cintent unlike youtube where we can only talk theory
Hey man, can you make a vid on partial emails/phone numbers? I found a partial icloud from forgot password with a phone no. but am clueless on what to do next
i have a question how to do you use RUclips and instgram anonymously?
Hi I'm trying to download hydra on termux but it says "pkg hydra not found" can you help:)
you should really create like a full course on hacking lol
Why use voice mod when we just need to have devs patch this
W editing
Good video 👀
Nice bro and you provide extra notes in pdf
hello Ali and greeting from Afghanistan i recommend that we need full info about malware and how to create if you provide for me that would be great .......Haidari
Thx for ur video. Could u speak about tails 6.0 cuz this version look not very like other and maybe spy version
could you do a video talking about the whoami tool?
New subscriber here.
Hii bro how to start your hacking field , and how to you build your skills . I asking because it may be base fore us.............
What are you, in the 6th grade?
Another one. Present!
great video
Good 👍
Good ass information for free. Thanks man!
👏👏👏
Keep it up
keep going, I beg
😮😮
Hello am new to hacking, what should I learn first?
You have to learn linux
@@13as4klu08 I already have it installed and know the basics of it, like LS command etc.
What is bluetooth hacking
Love You
nice
Do you hace any telegram Chanel?
Nope, but I'll launch one soon.
Plz
Ward driving❤
❤
Bro how to use dark web for free ethical hacking resource. Try to get website but I cant reached. Can you mack video how to use dark web and how to access free resource on it
I have a video lined up on the dark web and will try to include a segment related to this. However, I wouldn't recommend downloading any files from there, no matter how professional a website might seem...
@@an0n_aliyes bro It is harmful to download from dark web. But I want to free resource to learn ethical hacking. I exploring dark web on bootable kali but I bot understand how that works and how I find any links. Mack video what is the harm on dark web and how to use(like finding new link hosting secure web on dark etc.........)
First cmt.
First command under first command
ترجمة عربية
Kali linux
amazing video 🙏🙏👍👍👍👍👍love it
I was just thinking abott it tht lmao
Kannst du deutsch?
lmao, this is video cre from AI :)))
Blooover
Your voice is free dude
Why do this
Subarashi
I love you video 🎉❤
luv ya