This project is maintained by Sourcell Xu from DBAPP Security HatLab.
Bluetooth is a complex protocol, and a good scanner can quickly help us peek inside its secrets. But previous Bluetooth scanners suffered from a number of problems such as incomplete functionality, unintuitive information, and out-of repair. So we came up with this powerful Bluetooth scanner based on modern Python 3 ---- bluescan.
When hacking Bluetooth targets, bluescan can be very useful for intelligence collecting. It can collect the following information:
- BR devices
- LE devices
- BR LMP features
- LE LL features
- SMP Pairing features
- Real-time advertising physical channel PDU
- SDP services
- GATT services
- Vulnerabilities (demo)
Requirements
bluescan is based on BlueZ, the official Linux Bluetooth stack. It only supports running on Linux, and the following packages need to be installed:
sudo apt install python3-pip \
libcairo2-dev `# To solve the installation error "Failed to build pycairo" ` \
python3-dev `# To solve the installation error "Python.h: No such file or directory"` \
libgirepository1.0-dev `# To solve the installation error "Failed building wheel for PyGObject"` \
libbluetooth-dev `# To solve the installation error "bluetooth/bluetooth.h: No such file or directory"
Author
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- LiveSeptember 5, 2024"40 Steps" Satellite Security - Registration for LIVE WORKSHOP IS NOW ON!
- LiveAugust 21, 2024"40 Steps" Game Hacking - Registration for LIVE WORKSHOP IS NOW ON!
- BlogDecember 13, 2022What are the Common Security Weaknesses of Cloud Based Networks?
- BlogOctober 12, 2022Vulnerability management with Wazuh open source XDR
Subscribe
0 Comments
Newest