Bluetooth ScannersRSS

Bluetooth is becoming ever more prevalent in a wide variety of devices.  Some of these devices are left vulnerable, this page provides detail on scanning products and allow the user to scan for insecure devices in order to secure them.  

 

Other Resources http://trifinite.org/trifinite_org.html

The gun, which is called the BlueSniper rifle, can scan and attack Bluetooth devices from more than a mile away.

VendorDIY
Modified

btscanner 2.0 is a completely revamped version of the original. With all the features of 1.0, version 2.0 now boasts the ability to do brute force scans of OUI ranges. Both inquiry and brute force scan types are able to utilise multiple dongles to increas ...

VendorPentest Limited
Pricing ModelFreeware
Modified

Vendorcode bluetest.pl
Modified

Redfang  is a small proof-of-concept application to find non-discoverable Bluetooth devices by brute-forcing the last six bytes of the device's Bluetooth address and doing a read_remote_name(). This new version has streamlined code, enumerates servic ...

VendorOllie Whitehouse
Pricing ModelOpen Source
Modified

small bluetooth audit suit containing psm_scan, rfcomm_scan and a script for generating database entries for btdsd

Vendorcode bt_audit
Modified

BlueSpam searches for all discoverable bluetooth devices and sends a file to them (spams them) if they support OBEX. By default a small text will be send. To customize the message that should be send you need a palm with an SD/MMC card, then you create th ...

VendorPalmOS
Modified

Blueprinting is a method to remotely find out details about bluetooth-enabled devices. Blueprinting can be used for generating statistics about manufacturers and models and to find out whether there are devices in range that have issues with Bluetooth sec ...

VendorCollin Mulliner and Martin Herfurt
Modified

Blooover is a proof-of-concept tool that is intended to run on J2ME-enabled cell phones that appear to be comparably seamless. Blooover is a tool that is intended to serve as an audit tool that people can use to check whether their phones and phones of fr ...

VendorJ2ME Phones
Modified

The carwhisperer project intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.

VendorMartin Herfurt
Modified

Bluesnarfer will download the phonebook of any mobile device vulnerable to bluesnarfing.

Modified

L2ping sends a L2CAP echo request to the Bluetooth MAC address bd_addr given in dotted hex notation.

VendorMaxim Krasnyansky
Modified

The Pwn Phone 2014 is a cutting edge sleek LG Nexus 5 phone that doubles as a powerful penetration-testing device, making it incredibly easy to evaluate wired, wireless and Bluetooth networks. The most portable pentesting device yet, the Pwn Phone 2014’s ...

VendorPwnie Express
Pricing ModelCommercial
Modified
Pwn Plug R3

The Pwn Plug R3 is a next-generation penetration testing device in a portable, shippable, “Plug-and-Pwn” form factor. With onboard high-gain 802.11a/b/g/n wireless, onboard Bluetooth, external 4G/GSM cellular, ruggedized case design, and greatly improved ...

VendorPwnie Express
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2019