PIR_MadMax/Documentation/Articles.md
2026-02-02 17:18:21 +01:00

4 lines
No EOL
287 B
Markdown

Un article interessant qui s'agit des differents types d'attaque à **Bluetooth**:
- https://www.forbes.com/sites/alexvakulov/2025/02/20/11-types-of-bluetooth-attacks-and-how-to-protect-your-devices/
- https://hackers-arise.com/bluetooth-hacking-part-1-getting-started-with-bluetooth/