.

.

Tuesday, June 7, 2016

Roshan Thpa

Bluetooth Hacking: How to Hack Bluetooth?

Bluetooth hacking

Part 1: Terms, Technologies, & Security

Welcome, my friends!
So, today we are going to learn Bluetooth hacking. How to hack Bluetooth? is a very interesting question when someone wants to enter someone’s mobile phones. Many of you have seen the new series of Mr. Robot (my favorite Hacking Show). Why I am telling the show. Because this is a very beautiful created hacking show. In episode 6, Elliot hacked the Bluetooth keyboard of the police’s car, because he wants to enter the prison network to release nemesis, Vera.
Note: Hacking is an art. Don’t use it for bad purpose.
You can find Bluetooth in every computer, smartphones, iPods, tablets, speakers and other devices. Okay, what we are going to learn in this article. How to Hack Bluetooth?  If you hacked Bluetooth, you can get information on the device (pictures, emails, text, etc.), control of the device, and the ability to send unwanted info to the device.


Before starting Bluetooth hacking or how to hack Bluetooth we need to understand some basic technology, terms, and security that are built into Bluetooth, if we want to successfully hack it.
Bluetooth Hacking: Bluetooth Basic
Bluetooth technology was invented by telecom vendor Ericsson in 1994. Bluetooth is a popular wireless technology for exchanging data over short distances (5-30 meters). Bluetooth uses short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz.
Bluetooth technology is useful when we have to transfer data between two or more devices that are near each other when speed is not an issue, such as mobile phones, printers, modems, mouse, keyboards, office and industrial automation devices. Bluetooth technology is now using in various activity tracking devices, such as Jawbone and Fitbit.
Pairing is referred to the process when two Bluetooth devices connect to each-other. Generally any Bluetooth device has an ability to discover or find other devices and any discoverable Bluetooth device transmits the following information like Name, Class, List of services and other technical services.


In pairing, Bluetooth devices exchange a pre-shared secret key. Each device stores this secret key to identify the other in future pairing. Every device has a unique 48-bit identifier and usually a device manufacturer assigned this name.
Bluetooth Hacking: Bluetooth Tools
BlueZ is a protocol stack in Linux. It is installed by default in Kali Linux. BlueZ has a number of simple tools you can use in how to hack Bluetooth.
  1. hciconfig: this tool is similar to ifconfig in Linux. But this operates on the Bluetooth devices. You can use it to bring up the Bluetooth interface (hci0 in my case). And second, query the devices for its specs.
  2. hcitool: is an inquery tool. It give us device name, ID, class and device clock.
  3. hcidump: this tool enables us to sniff the Bluetooth communication.
Bluetooth Protocol Stack
Bluetooth Hacking Tools in Kali Linux
 In kali Linux we have several Bluetooth Hacking tools.  You can find these tools in Wireless Attacks->Bluetooth Tools list.
Here you can see many tools for Bluetooth hacking.
Bluelog: it’s a survey tool and it scans the surrounding for active Bluetooth devices. And it then logs them to a file.
Bluemaho: A GUI-based suite for testing the security of Bluetooth devices.
Blueranger: is simple python script.  It uses i2cap pings to locate BT devices and gives you their approx. distance.
Btscanner:  This is also a GUI-based tool to scan for BT devices within range.
Redfang: if you want to find hidden BT devices this tool will help you to do this.
Spooftooph: This is a spoofing tool.
Bluetooth Attacks
Blueprinting: The process of footprinting.
Bluesnarfing: This attack is used to fetch the data from the BT devices. Like, SMS, photos, phone book and chats.
Bluebugging: the attacker is able to take control of the target’s phone.
Bluejacking:
Bluesmack: A DoS attack against BT.
We have a rough or I can say basic understanding of BT terms, technologies and security. In future tutorials we will learn How to Hack Bluetooth. Keep visiting.

Roshan Thpa

About Roshan Thpa -

Roshan Kumar Thapa is veteran keen tech-savvy person which has enabled him to qualify for the job. He has knowledge in wide range of IT fields. He is highly trained and skilled in Graphic design, Tally, A+ hardware and networking, AutoCAD, Web Design/Development, Application Development, Video editing, Q-Basic and had good knowledge of C, C++, C# and Java programming. He keeps a keen interest in information technology and loves to keep himself updated through news, magazines, books, and blogs. He likes to learn and share his knowledge. He also runs a blog where he posts updates about the latest advancements in technology and his own teachings as well.

Subscribe to this Blog via Email :