Xtreme-Firmware icon indicating copy to clipboard operation
Xtreme-Firmware copied to clipboard

BadKB: Prompt for connections in BLE Spam style

Open analyserdmz opened this issue 1 year ago • 3 comments

I was wondering if it would be entirely impossible to execute a bad keyboard attack if a target device were to actually tap or click on the 'pair' button that appears when spoofing with BLE.

Just think about it. What if...?

analyserdmz avatar Nov 22 '23 14:11 analyserdmz

I don't think that is possible.

Mr-Proxy-source avatar Nov 25 '23 10:11 Mr-Proxy-source

I'm assuming I'm reading wrong and you're asking to execute a BLE HID attack WITHOUT pairing them first? No, however Bluetooth attacks get more and more sophisticated, so with kali or especially blackarch or if you spent some time researching anything is technically possible. Consider other ways to do HID attacks like mousejacking I'm not sure I haven't done looked in a while. Why Don't you get termux on your phone or if iPhone a kali vm (/UTM has iOS micro containers)

paradiselabs-ai avatar Nov 25 '23 19:11 paradiselabs-ai

really depends on the implementation. might be possible, needs some tinkering. its on my radar, just not a priority.

Willy-JL avatar Nov 28 '23 21:11 Willy-JL