{"id":32519,"date":"2024-03-27T09:52:34","date_gmt":"2024-03-27T09:52:34","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=32519"},"modified":"2024-03-27T09:52:35","modified_gmt":"2024-03-27T09:52:35","slug":"bluespy","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/bluespy\/","title":{"rendered":"BlueSpy &#8211; PoC To Record Audio From A Bluetooth Device"},"content":{"rendered":"\n<p>This repository contains the implementation of a proof of concept to record and replay audio from a bluetooth device without the legitimate user&#8217;s awareness.<\/p>\n\n\n\n<p>The PoC was demonstrated during the talk&nbsp;<strong>BSAM: Seguridad en Bluetooth<\/strong>&nbsp;at&nbsp;<strong>RootedCON 2024<\/strong>&nbsp;in Madrid.<\/p>\n\n\n\n<p>It&#8217;s designed to raise awareness about the insecure use of Bluetooth devices, and the need of a consistent methodology for security evaluations. <\/p>\n\n\n\n<p>That&#8217;s the purspose of\u00a0<strong>BSAM, the Bluetooth Security Assessment Methodology<\/strong>, published by Tarlogic and available\u00a0<a href=\"https:\/\/www.tarlogic.com\/bsam\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n\n\n\n<p>This proof of concept exploits the failure to comply with the\u00a0<a href=\"https:\/\/www.tarlogic.com\/bsam\/controls\/bluetooth-pairing-without-interaction\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>BSAM-PA-05 control<\/strong><\/a>\u00a0within the BSAM methodolgy. <\/p>\n\n\n\n<p>Consequently, the device enables the pairing procedure without requiring user interaction and exposes its functionality to any agent within the signal range.<\/p>\n\n\n\n<p>More information on our\u00a0<a href=\"https:\/\/www.tarlogic.com\/blog\/bluespy-spying-on-bluetooth-conversations\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">blog<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Requirements<\/strong><a href=\"https:\/\/github.com\/TarlogicSecurity\/BlueSpy#requirements\"><\/a><\/h2>\n\n\n\n<p>The code is written in Python and has been tested with Python 3.11.8, but it mainly uses widely available tools in Linux systems.<\/p>\n\n\n\n<p>The PoC uses the following tools:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>bluetoothctl<\/code><\/li>\n\n\n\n<li><code>btmgmt<\/code><\/li>\n\n\n\n<li><code>pactl<\/code><\/li>\n\n\n\n<li><code>parecord<\/code><\/li>\n\n\n\n<li><code>paplay<\/code><\/li>\n<\/ul>\n\n\n\n<p>In Arch Linux distributions,&nbsp;<code>bluetoothctl<\/code>&nbsp;and&nbsp;<code>btmgmt<\/code>&nbsp;can be installed with the package&nbsp;<code>bluez-utils<\/code>, while&nbsp;<code>pactl<\/code>,&nbsp;<code>parecord<\/code>&nbsp;and&nbsp;<code>paplay<\/code>&nbsp;are available in the&nbsp;<code>libpulse<\/code>&nbsp;package.<\/p>\n\n\n\n<p>For the PoC to work, it is necessary to have a working instalation of the BlueZ Bluetooth stack, available in the&nbsp;<code>bluez<\/code>package for Arch Linux distributions. A working instalation of an audio server compatible with PulseAudio, such as PipeWire, is also required to record and play audio.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Setup<\/strong><a href=\"https:\/\/github.com\/TarlogicSecurity\/BlueSpy#setup\"><\/a><\/h2>\n\n\n\n<p>Ensure that your device is capable of functioning as an audio source, meaning it has a microphone, and that it is discoverable and connectable via Bluetooth.<\/p>\n\n\n\n<p>For instance, to be discoverable and connectable, the earbuds used during the talk must be outside of their charging case. <\/p>\n\n\n\n<p>By default, they only activate the microphone when placed in the user&#8217;s ears, although this setting can be adjusted in the configuration app.<\/p>\n\n\n\n<p>Additionally, ensure that the device is not already connected, or alteratively, that it supports multiple connections.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Execution<\/strong><a href=\"https:\/\/github.com\/TarlogicSecurity\/BlueSpy#execution\"><\/a><\/h2>\n\n\n\n<p>Firstly, the address of the device must be discovered using a tool such as&nbsp;<code>bluetoothctl<\/code>:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ bluetoothctl\n&#91;bluetooth]# scan on<\/code><\/pre>\n\n\n\n<p>Once the address of the device is discovered, the script can handle the rest:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ python BlueSpy.py -a &lt;address&gt;\n<\/code><\/pre>\n\n\n\n<p>Note: The script might prompt for superuser permissions to modify the configuration of your&nbsp;<strong>BlueZ<\/strong>&nbsp;instance and pair with the remote device.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Troubleshooting<\/strong><a href=\"https:\/\/github.com\/TarlogicSecurity\/BlueSpy#troubleshooting\"><\/a><\/h2>\n\n\n\n<p><code>BlueSpy.py<\/code>&nbsp;is the main script that executes every step of the process. However, if you encounter issues with nay of the phases, so it might be helpful to execute them individually:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>pair.py<\/code>&nbsp;utilizes the command-line tool&nbsp;<code>btmgmt<\/code>&nbsp;to modify the configuration of your&nbsp;<strong>BlueZ<\/strong>&nbsp;and initiate a pairing process with the remote device. The exact commands used are in the&nbsp;<code>pair<\/code>&nbsp;function inside&nbsp;<code>core.py<\/code>.<\/li>\n\n\n\n<li><code>connect.py<\/code>&nbsp;utilizes the command-line tool&nbsp;<code>bluetoothctl<\/code>&nbsp;to initiate a quick scan (necesary for BlueZ) and establish a connection to the device. The exact commands used are in the&nbsp;<code>connect<\/code>&nbsp;function inside&nbsp;<code>core.py<\/code>.<\/li>\n\n\n\n<li><code>just_record.py<\/code>&nbsp;utilizes the command-line tools&nbsp;<code>pactl<\/code>&nbsp;and&nbsp;<code>parecord<\/code>&nbsp;to search for the device in the system&#8217;s audio sources (it must function as a microphone) and initiate a recording session. The exact commands used are in the&nbsp;<code>record<\/code>&nbsp;function inside&nbsp;<code>core.py<\/code>.<\/li>\n\n\n\n<li>The&nbsp;<code>playback<\/code>&nbsp;function inside&nbsp;<code>core.py<\/code>&nbsp;executes&nbsp;<code>paplay<\/code>&nbsp;to play back the captured audio.<\/li>\n<\/ul>\n\n\n\n<p>If you encounter issues with any of the phases, examine the commands in&nbsp;<code>core.py<\/code>&nbsp;and try to execute them in a shell. This will provide more information on what may be failing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This repository contains the implementation of a proof of concept to record and replay audio from a bluetooth device without the legitimate user&#8217;s awareness. The PoC was demonstrated during the talk&nbsp;BSAM: Seguridad en Bluetooth&nbsp;at&nbsp;RootedCON 2024&nbsp;in Madrid. It&#8217;s designed to raise awareness about the insecure use of Bluetooth devices, and the need of a consistent methodology [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":32529,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,25],"tags":[6657,737,6321,6052,6325],"class_list":["post-32519","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-hacking-tools","tag-bluespy","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BlueSpy - PoC To Record Audio From A Bluetooth Device<\/title>\n<meta name=\"description\" content=\"This repository contains the implementation of a proof of concept to record and replay audio from a bluetooth device without the legitimate\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/bluespy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlueSpy - PoC To Record Audio From A Bluetooth Device\" \/>\n<meta property=\"og:description\" content=\"This repository contains the implementation of a proof of concept to record and replay audio from a bluetooth device without the legitimate\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/bluespy\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-27T09:52:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-27T09:52:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/bluespy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/bluespy\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"BlueSpy &#8211; PoC To Record Audio From A Bluetooth Device\",\"datePublished\":\"2024-03-27T09:52:34+00:00\",\"dateModified\":\"2024-03-27T09:52:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/bluespy\/\"},\"wordCount\":582,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/bluespy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp\",\"keywords\":[\"BlueSpy\",\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\",\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/bluespy\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/bluespy\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/bluespy\/\",\"name\":\"BlueSpy - PoC To Record Audio From A Bluetooth Device\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/bluespy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/bluespy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp\",\"datePublished\":\"2024-03-27T09:52:34+00:00\",\"dateModified\":\"2024-03-27T09:52:35+00:00\",\"description\":\"This repository contains the implementation of a proof of concept to record and replay audio from a bluetooth device without the legitimate\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/bluespy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/bluespy\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlueSpy - PoC To Record Audio From A Bluetooth Device","description":"This repository contains the implementation of a proof of concept to record and replay audio from a bluetooth device without the legitimate","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/bluespy\/","og_locale":"en_US","og_type":"article","og_title":"BlueSpy - PoC To Record Audio From A Bluetooth Device","og_description":"This repository contains the implementation of a proof of concept to record and replay audio from a bluetooth device without the legitimate","og_url":"https:\/\/kalilinuxtutorials.com\/bluespy\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-03-27T09:52:34+00:00","article_modified_time":"2024-03-27T09:52:35+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/bluespy\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/bluespy\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"BlueSpy &#8211; PoC To Record Audio From A Bluetooth Device","datePublished":"2024-03-27T09:52:34+00:00","dateModified":"2024-03-27T09:52:35+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/bluespy\/"},"wordCount":582,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/bluespy\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp","keywords":["BlueSpy","cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security","Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/bluespy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/bluespy\/","url":"https:\/\/kalilinuxtutorials.com\/bluespy\/","name":"BlueSpy - PoC To Record Audio From A Bluetooth Device","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/bluespy\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/bluespy\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp","datePublished":"2024-03-27T09:52:34+00:00","dateModified":"2024-03-27T09:52:35+00:00","description":"This repository contains the implementation of a proof of concept to record and replay audio from a bluetooth device without the legitimate","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/bluespy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/bluespy\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWMaHodY0HKMcVRn1Ql_M55V0xs6u39R2YBSTu2jCrN1-SuJdsvd-600YSs-bwzaRzbXitBTKV4jkfN0qwWaa9eJoSDOySHSKICZxJIFmSWoECB1YBVFf8vwD-R70JXYbSC5hFPZCb_F27xf3GWWmXrTThSkBwK6_7ncaJHQ7AHgcYS11nMKeMTdPBM6jU\/s16000\/ArtifactCollector%20(3).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":34071,"url":"https:\/\/kalilinuxtutorials.com\/exploit-yaml-dsl\/","url_meta":{"origin":32519,"position":0},"title":"Exploit YAML DSL &#8211; Advanced Configurations For Bluetooth Vulnerability Testing","author":"Varshini","date":"July 31, 2024","format":false,"excerpt":"Dives into the intricate world of YAML-based Domain Specific Language (DSL) used for defining and managing exploits in security testing environments. This article explores how YAML DSL facilitates precise configuration and automation of tools targeting Bluetooth vulnerabilities, showcasing examples like Internalblue and Braktooth to illustrate practical applications. Stay tuned for\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnirQ4nccy1e1Mp300PSJbPD7SlGECGZX_9TA9y7KSTkpgWkGD_Qwm_pVCkLk3xQ_bqPg-bB6a6JSpdooX8LYI319PBvLOpHfJDbm9CxgZMQSTcaljDBjDAc2DouqarQuhsbvZ42im2W5ywRIshWh0XBhUl21ATtAvu_XPf7U58h19ofMBkOevbURblYAc\/s16000\/Exploit%20YAML%20DSL.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnirQ4nccy1e1Mp300PSJbPD7SlGECGZX_9TA9y7KSTkpgWkGD_Qwm_pVCkLk3xQ_bqPg-bB6a6JSpdooX8LYI319PBvLOpHfJDbm9CxgZMQSTcaljDBjDAc2DouqarQuhsbvZ42im2W5ywRIshWh0XBhUl21ATtAvu_XPf7U58h19ofMBkOevbURblYAc\/s16000\/Exploit%20YAML%20DSL.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnirQ4nccy1e1Mp300PSJbPD7SlGECGZX_9TA9y7KSTkpgWkGD_Qwm_pVCkLk3xQ_bqPg-bB6a6JSpdooX8LYI319PBvLOpHfJDbm9CxgZMQSTcaljDBjDAc2DouqarQuhsbvZ42im2W5ywRIshWh0XBhUl21ATtAvu_XPf7U58h19ofMBkOevbURblYAc\/s16000\/Exploit%20YAML%20DSL.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnirQ4nccy1e1Mp300PSJbPD7SlGECGZX_9TA9y7KSTkpgWkGD_Qwm_pVCkLk3xQ_bqPg-bB6a6JSpdooX8LYI319PBvLOpHfJDbm9CxgZMQSTcaljDBjDAc2DouqarQuhsbvZ42im2W5ywRIshWh0XBhUl21ATtAvu_XPf7U58h19ofMBkOevbURblYAc\/s16000\/Exploit%20YAML%20DSL.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnirQ4nccy1e1Mp300PSJbPD7SlGECGZX_9TA9y7KSTkpgWkGD_Qwm_pVCkLk3xQ_bqPg-bB6a6JSpdooX8LYI319PBvLOpHfJDbm9CxgZMQSTcaljDBjDAc2DouqarQuhsbvZ42im2W5ywRIshWh0XBhUl21ATtAvu_XPf7U58h19ofMBkOevbURblYAc\/s16000\/Exploit%20YAML%20DSL.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnirQ4nccy1e1Mp300PSJbPD7SlGECGZX_9TA9y7KSTkpgWkGD_Qwm_pVCkLk3xQ_bqPg-bB6a6JSpdooX8LYI319PBvLOpHfJDbm9CxgZMQSTcaljDBjDAc2DouqarQuhsbvZ42im2W5ywRIshWh0XBhUl21ATtAvu_XPf7U58h19ofMBkOevbURblYAc\/s16000\/Exploit%20YAML%20DSL.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32680,"url":"https:\/\/kalilinuxtutorials.com\/cve-2024-3273-proof-of-concept-poc\/","url_meta":{"origin":32519,"position":1},"title":"CVE-2024-3273 Proof Of Concept (PoC) : Unveiling The Vulnerability In D-Link NAS Devices","author":"Varshini","date":"April 8, 2024","format":false,"excerpt":"This repository contains a Proof of Concept (PoC) for CVE-2024-3273, a security vulnerability discovered in D-Link NAS devices. The vulnerability allows attackers to execute arbitrary commands on vulnerable devices. CVE-2024-3273 is a vulnerability in D-Link NAS devices that allows remote attackers to execute arbitrary commands via a crafted HTTP request\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjigChMDEcFdgdDJ2_81ouB9_8SWyorSspneaI14FQ2L4kRVppKs1STb1Z1Gy8zGDuR7YSxCQde2XAYG9eq91kCjw7dz_YAkkjdhfSxzOydovZcBZ18hUC-B33dKWVyk-hJ9ihumduQWd8uuObgIHburWuUsKioe5UcuFbDd6hgQJGD0e81-1pDUF77r0bH\/s16000\/CVE-2024-3273%20Proof%20Of%20Concept%20%28PoC%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjigChMDEcFdgdDJ2_81ouB9_8SWyorSspneaI14FQ2L4kRVppKs1STb1Z1Gy8zGDuR7YSxCQde2XAYG9eq91kCjw7dz_YAkkjdhfSxzOydovZcBZ18hUC-B33dKWVyk-hJ9ihumduQWd8uuObgIHburWuUsKioe5UcuFbDd6hgQJGD0e81-1pDUF77r0bH\/s16000\/CVE-2024-3273%20Proof%20Of%20Concept%20%28PoC%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjigChMDEcFdgdDJ2_81ouB9_8SWyorSspneaI14FQ2L4kRVppKs1STb1Z1Gy8zGDuR7YSxCQde2XAYG9eq91kCjw7dz_YAkkjdhfSxzOydovZcBZ18hUC-B33dKWVyk-hJ9ihumduQWd8uuObgIHburWuUsKioe5UcuFbDd6hgQJGD0e81-1pDUF77r0bH\/s16000\/CVE-2024-3273%20Proof%20Of%20Concept%20%28PoC%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjigChMDEcFdgdDJ2_81ouB9_8SWyorSspneaI14FQ2L4kRVppKs1STb1Z1Gy8zGDuR7YSxCQde2XAYG9eq91kCjw7dz_YAkkjdhfSxzOydovZcBZ18hUC-B33dKWVyk-hJ9ihumduQWd8uuObgIHburWuUsKioe5UcuFbDd6hgQJGD0e81-1pDUF77r0bH\/s16000\/CVE-2024-3273%20Proof%20Of%20Concept%20%28PoC%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjigChMDEcFdgdDJ2_81ouB9_8SWyorSspneaI14FQ2L4kRVppKs1STb1Z1Gy8zGDuR7YSxCQde2XAYG9eq91kCjw7dz_YAkkjdhfSxzOydovZcBZ18hUC-B33dKWVyk-hJ9ihumduQWd8uuObgIHburWuUsKioe5UcuFbDd6hgQJGD0e81-1pDUF77r0bH\/s16000\/CVE-2024-3273%20Proof%20Of%20Concept%20%28PoC%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjigChMDEcFdgdDJ2_81ouB9_8SWyorSspneaI14FQ2L4kRVppKs1STb1Z1Gy8zGDuR7YSxCQde2XAYG9eq91kCjw7dz_YAkkjdhfSxzOydovZcBZ18hUC-B33dKWVyk-hJ9ihumduQWd8uuObgIHburWuUsKioe5UcuFbDd6hgQJGD0e81-1pDUF77r0bH\/s16000\/CVE-2024-3273%20Proof%20Of%20Concept%20%28PoC%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":139,"url":"https:\/\/kalilinuxtutorials.com\/bluelog\/","url_meta":{"origin":32519,"position":2},"title":"Bluelog","author":"Ravi Sankar","date":"May 29, 2015","format":false,"excerpt":"Simple Bluetooth Discovery with Bluelog Bluelog is a simple Bluetooth scanner that is designed to essentially do just one thing, log all the discoverable devices in the area. It is intended to be used as a site survey tool, identifying the number of possible Bluetooth targets there are in the\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/kalilinuxtutorials.com\/category\/tuts\/"},"img":{"alt_text":"bluetooth","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/05\/bluelog1.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/05\/bluelog1.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/05\/bluelog1.png?resize=525%2C300 1.5x"},"classes":[]},{"id":31313,"url":"https:\/\/kalilinuxtutorials.com\/splunk-rce\/","url_meta":{"origin":32519,"position":3},"title":"Splunk RCE &#8211; PoC: In-Depth Analysis and Exploitation Methodology","author":"Varshini","date":"November 20, 2023","format":false,"excerpt":"This article delves into a critical vulnerability in Splunk, identified as CVE-2023-46214. It provides a detailed analysis and a Proof of Concept (PoC) script to demonstrate the vulnerability's exploitation. The script is designed for educational purposes, helping to understand the security implications of this vulnerability in Splunk, a popular data\u2026","rel":"","context":"In &quot;Vulnerability Analysis&quot;","block_context":{"text":"Vulnerability Analysis","link":"https:\/\/kalilinuxtutorials.com\/category\/vulnerability-analysis-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCgwArktgAVTamsS74PS6S9FVhYpGR9GoIfR__I_AGW3jIe7D8UgC3Se1kosSHg4ej7wKSU60HmlM3G42UNMh_nGRpVYooVJ_wCZ1TfGBHysIbZyor3oWAkYnPah4r9N7udSEQwArjPpWBFNR_Yy3jKAU2X1fte0cPcTIMbdwNbiOmtOSuEAsaxxoEcg\/s16000\/poc.gif?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCgwArktgAVTamsS74PS6S9FVhYpGR9GoIfR__I_AGW3jIe7D8UgC3Se1kosSHg4ej7wKSU60HmlM3G42UNMh_nGRpVYooVJ_wCZ1TfGBHysIbZyor3oWAkYnPah4r9N7udSEQwArjPpWBFNR_Yy3jKAU2X1fte0cPcTIMbdwNbiOmtOSuEAsaxxoEcg\/s16000\/poc.gif?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCgwArktgAVTamsS74PS6S9FVhYpGR9GoIfR__I_AGW3jIe7D8UgC3Se1kosSHg4ej7wKSU60HmlM3G42UNMh_nGRpVYooVJ_wCZ1TfGBHysIbZyor3oWAkYnPah4r9N7udSEQwArjPpWBFNR_Yy3jKAU2X1fte0cPcTIMbdwNbiOmtOSuEAsaxxoEcg\/s16000\/poc.gif?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCgwArktgAVTamsS74PS6S9FVhYpGR9GoIfR__I_AGW3jIe7D8UgC3Se1kosSHg4ej7wKSU60HmlM3G42UNMh_nGRpVYooVJ_wCZ1TfGBHysIbZyor3oWAkYnPah4r9N7udSEQwArjPpWBFNR_Yy3jKAU2X1fte0cPcTIMbdwNbiOmtOSuEAsaxxoEcg\/s16000\/poc.gif?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":7504,"url":"https:\/\/kalilinuxtutorials.com\/atfuzzer-dynamic-analysis-at-interface-android\/","url_meta":{"origin":32519,"position":4},"title":"ATFuzzer : Dynamic Analysis of AT Interface For Android Smartphones","author":"R K","date":"November 29, 2019","format":false,"excerpt":"Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones\" is accepted to the 35th Annual Computer Security Applications Conference (ACSAC) 2019. This paper focuses on checking the correctness and robustness of the AT command interface exposed by the cellular baseband processor through Bluetooth and USB. A\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12119,"url":"https:\/\/kalilinuxtutorials.com\/radareeye\/","url_meta":{"origin":32519,"position":5},"title":"RadareEye : A Tool Made For Specially Scanning Nearby devices","author":"R K","date":"January 19, 2021","format":false,"excerpt":"RadareEye is a tool made for specially scanning nearby devices[BLE,Bluetooth & Wifi] and execute our given command on our system when the target device comes in between range. NOTE:- RadareEye Owner will be not responsible if any user performs malicious activities using this tool. Use it for Learning purpose only.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=32519"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32519\/revisions"}],"predecessor-version":[{"id":32520,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32519\/revisions\/32520"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/32529"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=32519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=32519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=32519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}