

You can see that its current state is down, which means that it's not able to do anything, so the first thing we need to do to work with Bluetooth is to bring our interface up. It's what we'll be using to do all of the things we want to do with Bluetooth. In my example, we can see a Bluetooth interface. TX bytes:368 acl:0 sco:0 commands:30 errors:0

RX bytes:574 acl:0 sco:0 events:30 errors:0

If you're familiar with ifconfig for Wi-Fi cards and adapters, there is another tool that is similar for Bluetooth devices. Step 1: Enable Your Bluetooth Adapter with hciconfig Don't Miss: Using MultiBlue to Control Any Mobile Device via Bluetooth.With an excellent Bluetooth adapter, which is needed, you should be able to reach Bluetooth devices in a coffee shop, school classroom, office, and maybe even into a neighbor's house. Of course, we have to be in fairly close proximity to hack Bluetooth. (We will also use some specialized tools for Bluetooth recon in Kali.) Many of these tools are included in BlueZ, the default Bluetooth protocol stack in nearly every version of Linux, including Kali. The built-in tools we'll be covering below include hciconfig, hcitool, sdptool, l2ping, and btscanner.

To keep things super basic, we're not installing anything extra, and we can just work with the Bluetooth tools that Kali Linux has by default. To begin Bluetooth surveillance, you'll need a fully updated version of Kali Linux installed because we're going to be using Bluetooth tools that are built-in. Because of that, it's useful to do the reconnaissance in case we can either take control of the device, identify a vulnerability, or find a vulnerability later that matches up with one that's nearby. However, we can still track nearby Bluetooth devices, read from them, and even write specific characteristics. Otherwise, you're not going to get anything useful, and it's impossible to jump into the conversation the way you can with Wi-Fi. That means it's impossible to sit there and sniff the key because you need to be there the first time these devices communicate. Instead, Bluetooth negotiates a key once at the beginning, stores the secret key, and then refers to it every time it sees the same device. Robot Hacked BluetoothĪnother property is that Bluetooth doesn't negotiate a key every single time like Wi-Fi does, where it's easy for anyone to join and leave the Wi-Fi network. It makes it difficult for an attacker to listen in on the conversation in the first place. That means we can't merely sit on one frequency and listen because they're going to be hopping all over the place. There's enhanced security so that popular Wi-Fi hacking tools won't work on Bluetooth.įor one, they're continually hopping frequencies, so if you have two devices communicating over Bluetooth, they're both using an algorithm that shifts the frequency many times per second. Hack their Bluetooth connection, and you may be able to access all of that data.Īlthough Bluetooth shares the same 2.4 GHz frequency as Wi-Fi, the properties are different because the protocols are not quite the same. Nearly every device has Bluetooth capabilities, and people store a great deal of personal info on their phones and tablets. Bluetooth hacking gives a clear window into the world of the target. While many people may use Bluetooth every day, the majority don't know how it works or that it can be hacked.
