CyberMoransđ€
Bluetooth hacking offers attackersđ a window of opportunity to access confidential information on phones and tabletsđ. Although Bluetooth shares the same frequency of 2.4 GHz as WiFi, the protocol used here is different. You cannot use the same resources as WiFi Hackingđ
In this post, learn how to identify nearby Bluetooth devices, using purely the built-in kali features and bettercap for locating devices, and target devicesđ
Morans, Lets do this then...đđȘ
đ HCICONFIG
The first tool is hciconfig same as ifconfig but it is for Bluetooth devices. Hciconfig is the tool used to configure Bluetooth devices. See attached Bluetooth devices or can add the Bluetooth devices and configure them đ
kali > hciconfig
When you open hciconfig the state of the device is DOWN. The device should be in UP and Running state đ
kali > hciconfig {your-MACaddress} up
After this command, you can run the hciconfig command again and see that the state has changed to UP and Running đ
kali > hciconfig âhelp
get the commands available to use. Here I am using few commands as an example. Here I use -a, p scan, and name command for example purpose. You can use the man hciconfig command to get more information about hciconfigâșïž
đ HCITOOL
HCITOOL is another built-in tool of Kali Linux for configuring and finding nearby Bluetooth devices. This tool sends a special command to Bluetooth devices. If no command passed hcitool prints some basic device information and existsđ€Ș
kali > hcitool scan
kali > man hcitool
You can use the man command to find more information on hcitool. Here I am using some extra commands but you can explore more with practiceđ
The scan command will give you a list of the active devices nearby. Here I am using the name, info, and inquiry commands for illustration and just to be extrađ
đ SDPTool
Sdptool provides an interface for Bluetooth devices to perform SDP queries and manage a local SDP database.You can use sdptool to get more information on the target device. Use man command to get more information about sdptool.
kali > man sdptool
đ Bt Scanner
Bt scanner is a tool that is specifically designed to collect as much information from a Bluetooth device as possible without the mandatory pairing. A detailed information screen extracts HCI and SDP information and maintains an open link to track the RSSI and connection quality. To get more information use the man command.
kali > man bt scanner
The default screen of the Bt scanner đ
By pressing the keys given at the end of the page you can run the scans that are available and so various other things. Here I am using an inquiry scanđ
When youâll press i youâll get the list of active devices nearby. By clicking on them you can get a lot of information about the deviceđ€. By gathering as much information as possible it is possible to take an educated guess about the device đ
đ Bettercap
Bettercap includes attack modulesđ for various radio and network technology. only concentrating on the Bluetooth module today, but Bettercap has a lot more to it than just Bluetooth hacking. It is also my personal favourite bluetooth exploit tool -- âșïž
You can download bettercap here đ
Ultimately, even though it changes its MAC address, we can write datađ to the target or victim to attempt to exploit â ïž it, like a tag to monitor the device over time.
After installing bettercap use âhelp command to know the active modules đ
To Start searching for Bluetooth devices or list of active Bluetooth devices, typeđ
>> net. recon on
Start bettercap in sniffing mode typeđ
>> ble. recon
The list of devices that you have discovered from scanning with the commandđ
>> ble. show
After getting the scan results you can dig a little deeper into the device. But the important thing is to know the MAC Address of the targetđ€
To enumerate details about the device you can use the commandđ
>> ble.enum
đ Exploiting the target
You can see that some of the services has write property enabled on themđ You can access the property. Let's try writing some data on the target device. We can write the value of "any-value-you-want" to that device by typing the command ble.write TheMacAddress TheFieldToWriteTo ValueToWrite. Itâs not necessaryđ© that you will be able to write on the device all the time, just about 3 out of 5đ„ž
We can use Bettercap to start pokingđ€ around for ways to further exploit nearby devices if we learn a device is running a service with a vulnerability that we can exploit by writing to a value đ Using MAC address randomization, we can also use these fields to fingerprint devices, as the values will uniquely identify a device that alters other properties such as its MAC address to try to avoid correlation. Bluetooth radio transmissions can be discovered and unmasked to track the people and devicesđ
đConclusion đ€
Subscribe to receive notifications of similar posts đ where we will be reverse engineering malware, vulnerabilities as well as hacking tools, vectors, stories, tutorials and other Infosec stuff...đ
Follow me on twitter for daily Infosec Memes and shenanigansđ
Moransđ
Thank you for taking time and hope you learned something new, Like/Share and leave a comment and as always, stay awesome! đđ đȘ
Comments