How to Enable/Fix Bluetooth Problem in Kali Linux 2017.3

If you are running Kali Linux and your Bluetooth is not working. Let’s fix that. It will be up and running in no time. First of all, open a terminal window. then type this command sudo lsmod | grep bluetooth This will search for “bluetooth” in the lsmod. Now you need to enable bluetooth using […]

BlueMaho v090417 – Bluetooth Security Testing Suite

BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on python, uses wxPyhon. It can be used for testing BT-devices for known vulnerabilities and major thing to do – testing to find unknown vulns. Also it can form nice statistics. 1.2. What it can do? […]

BtleJuice Framework – Bluetooth Smart (LE) Man-in-the-Middle Framework

BtleJuice is a complete framework to perform Man-in-the-Middle attacks on Bluetooth Smart devices (also known as Bluetooth Low Energy). It is composed of: an interception core an interception proxy a dedicated web interface Python and Node.js bindings How to install BtleJuice ? Installing BtleJuice is a child’s play. First of all, make sure your system […]

Bluepot – Bluetooth Honeypot

Bluepot was a third year university project attempting to implement a fully functional Bluetooth Honeypot. A piece of software designed to accept and store any malware sent to it and interact with common Bluetooth attacks such as “BlueBugging?” and “BlueSnarfing?”. The system also allows monitoring of attacks via a graphical user interface that provides graphs, […]

Remotely Cracking Bluetooth Enabled Gun Safes

  In this blog post, we will detail BlueSteal, or the ability to exploit multiple security failures in the Vaultek VT20i. These vulnerabilities highlight the need to include security audits early in the product manufacturing process. These vulnerabilities include CVE-2017-17435 and CVE-2017-17436. The VT20i is a very popular product designed for the safe storage of firearms […]

Amazon Echo and Google Home were vulnerable to Bluetooth exploit

Don’t worry, these vulnerabilities have already been patched out. Back in September, Bluetooth-connected device owners got a little scare when security firm Armis disclosed a new hack exploit known as BlueBorne. In theory, bad actors could target smartphones, tablets and such using specific vectors in Bluetooth connectivity. Armis had informed Apple, Microsoft and Google months before and […]

Bluetooth Hack Affects 20 Million Amazon Echo and Google Home Devices

A series of recently disclosed critical Bluetooth flaws that affect billions of Android, iOS, Windows and Linux devices have now been discovered in millions of AI-based voice-activated personal assistants, including Google Home and Amazon Echo. As estimated during the discovery of this devastating threat, several IoT and smart devices whose operating systems are often updated […]

BlueBorne Bluetooth Vulnerability Can Hack a SmartPhone In Seconds

Bluetooth technology is not a new thing but its starting to become very popular. Bluetooth is now seen in a lot of different areas from SmartPhones, Smart Watches, Cars, IoT devices, Smart TVS, Games Consoles, Security devices, in our homes, smart devices. Bluetooth is used in many industries and areas of technology such as medical […]

blueborne-scanner – Bluetooth scanner for blueborne-vulnerable devices

Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit VPN Gate auto-grabber Greetz shouts to sh3llg0d, an0n_l1t3, daemochi, akatz!!!! Overview Bluetooth scanner for blueborne-vulnerable devices, Android only for the moment Quickstart git clone https://github.com/hook-s3c/blueborne-scanner.git cd blueborne-scanner sudo chmod +x ./bluebornescan.py pip install -r ./requirements.txt ./bluebornescan.py Breakdown Scans for local bluetooth devices Looks […]

BlueBorne – 8 Zero Day Bugs Threaten 8.2 Billion Bluetooth-Enabled Devices

Asecurity firm Armis has identified a set of 8 zero-day bugs, collectively known as BlueBorne, which put Bluetooth-capable devices at the risk of being compromised. The firm speculates the number of bugs might increase as their research continues. Armis has tagged four of the vulnerabilities as critical. These bugs allow attackers to take control of users’ […]

BlueBorne Bluetooth Flaw Affects Millions of Smartphones, IoT and PCs

A Palo Alto based Internet of Things (IoT) security company Armis has discovered critical vulnerabilities in Bluetooth that if exploited can allow attackers to carry out remote attacks on millions of Android, iOS, Linux and Windows devices with Bluetooth enabled. Dubbed “BlueBorne” by researchers, the attack can be successfully carried out without any user interaction. That means […]

Bluetooth-enabled Fidget Spinners are Blowing Up

A fidget spinner is a toy device which in 2017 has become increasingly popular among teens and adults. It consists of a bearing in the center of a multi-lobed flat structure made from metal or plastic designed to spin along its axis with little effort. It is being reported that that Bluetooth-enabled fidget spinners are exploding. Until now, […]

Gattacker – A Node.js package for BLE (Bluetooth Low Energy) security assessment

A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks DOWNLOAD GATTACK http://www.gattack.io Install npm install gattacker Usage Configure Running both components Set up variables in config.env: NOBLE_HCI_DEVICE_ID : noble (“central”, ws-slave) device BLENO_HCI_DEVICE_ID : bleno (“peripheral”, advertise) device If you run “central” and “peripheral” modules on separate boxes with […]

Cars with Vulnerable WIFI Dongle can be Hacked via Bluetooth

We have already seen a massive growth in the connected-car technology market over the past few years, and it is going to increase further more. But there are underlying threats hanging on the connected-car technology‘s users which if exploited can allow hackers to remotely shut down a targeted car. These threats were revealed by a […]

Hack Someone’s Bluetooth And Other Wireless Tools Using Kali Linux

Blooover is performing the Bluebug attack(Bluetooth sniffer Linux). Whilst you intend to install the software, you have to be using a phone that has the Java Bluetooth API applied. Functions: reading phonebooks Writing phonebook entries analyzing/deciphering SMS saved in the tool placing call forward starting up phone name the way to Hack Bluetooth And other […]

Bluetooth Bug Lets Burglars Disable Google Nest Cams

Burglars can use a recently disclosed security flaw affecting several Google Nest cams to make vulnerable cameras go offline for approximately 60 to 90 seconds. The flaw can be exploited via the cameras’ Bluetooth connection and can provide thieves with the time window they need to get close and break into a home unseen, and […]

Hackers can crash Google’s Nest Dropcams by exploiting Bluetooth flaws

Last year Google found some critical security flaws in Microsoft’s Edge browser and urged the company to fix these flaws within nine months but Microsoft acted otherwise, and the browser is still vulnerable to cyber attacks. In return, Google security researchers published some aspects regarding the flaws to give a glimpse into their findings. Fair […]

Bluetooth-enabled safe lock popped after attackers win PINs

If you use one, stop now. If you write heist movies, write safe-crackers out of your script. Attackers can locate and pop safes protected with high security commercial locks thanks to poor Bluetooth implementations, say researchers at Somerset Recon say. The SecuRam ProLogic B01 locks are badged as the industry’s only Bluetooth-packing lock for safes […]

Hands-on: Blue Hydra can expose the all-too-unhidden world of Bluetooth

Bluetooth Low Energy devices like smart watches, “wearables,” give you up all day. My new neighbor was using AirDrop to move some files from his phone to his iMac. I hadn’t introduced myself yet, but I already knew his name. Meanwhile, someone with a Pebble watch was walking past, and someone named “Johnny B” was idling […]

BLUETOOTH HACK LEAVES MANY SMART LOCKS, IOT DEVICES VULNERABLE

Sławomir Jasek with research firm SecuRing is sounding an alarm over the growing number of Bluetooth devices used for keyless entry and mobile point-of-sales systems that are vulnerable to man-in-the-middle attacks. Jasek said the problem is traced back to devices that use the Bluetooth Low Energy (BLE) feature for access control. He said too often […]