Xtreme-Firmware
Xtreme-Firmware copied to clipboard
BadKB: Prompt for connections in BLE Spam style
I was wondering if it would be entirely impossible to execute a bad keyboard attack if a target device were to actually tap or click on the 'pair' button that appears when spoofing with BLE.
Just think about it. What if...?
I don't think that is possible.
I'm assuming I'm reading wrong and you're asking to execute a BLE HID attack WITHOUT pairing them first? No, however Bluetooth attacks get more and more sophisticated, so with kali or especially blackarch or if you spent some time researching anything is technically possible. Consider other ways to do HID attacks like mousejacking I'm not sure I haven't done looked in a while. Why Don't you get termux on your phone or if iPhone a kali vm (/UTM has iOS micro containers)
really depends on the implementation. might be possible, needs some tinkering. its on my radar, just not a priority.