BlueScan – A Bluetooth Device Scanner

Outsmart Malicious Hackers


BlueScan is a BASH script that acts as a Bluetooth device scanner. It’s a tool designed to detect Bluetooth devices within the radio range of your system and extract as much information as possible from the devices without the requirement to pair.

BlueScan - A Bluetooth Device Scanner

The tool works unobtrusively, ie without establishing a connection to the devices found and undetected. No superuser privileges are required to run it.

Requirements

  • A GNU / Linux operating system
  • A kernel version 2.4.6 or higher with the Bluetooth protocol stack implemented
  • A Bluetooth adapter that provides the system with HCI interface
  • Libraries – libbluetooth2 & bluez-utils

Features

Currently it is able to detect:

  • BD device address (is equivalent to the MAC of a network card)
  • Device Name
  • Manufacturer (in most cases)
  • Active services on the device
  • Open channels on the device

One caveat, it’s in Spanish, so yah – you’ll have to figure that out.

You can download BlueScan here:

bluescan_1.0.6.zip

Or read more here.

Posted in: Hacking Tools, Networking Hacking

, ,


Latest Posts:


BootStomp - Find Bootloader Vulnerabilities BootStomp – Find Android Bootloader Vulnerabilities
BootStomp is a Python-based tool, with Docker support that helps you find two different classes of bootloader vulnerabilities and bugs.
Google Chrome Marking ALL Non-HTTPS Sites Insecure July 2018 Google Chrome Marking ALL Non-HTTPS Sites Insecure July 2018
Google is ramping up its campaign against HTTP only sites and is going to mark ALL Non-HTTPS sites insecure in July 2018 with the release of Chrome 68.
altdns - Subdomain Recon Tool With Permutation Generation altdns – Subdomain Recon Tool With Permutation Generation
Altdns is a subdomain recon tool in Python that allows for the discovery of subdomains that conform to patterns. The tool takes in words that could be present in subdomains under a domain (such as test, dev, staging) as well as takes in a list of subdomains that you know of.
0-Day Flash Vulnerability Exploited In The Wild 0-Day Flash Vulnerability Exploited In The Wild
So another 0-Day Flash Vulnerability is being exploited in the Wild, a previously unknown flaw which has been labelled CVE-2018-4878 and it affects 28.0.0.137 and earlier versions
dorkbot - Command-Line Tool For Google Dorking dorkbot – Command-Line Tool For Google Dorking
dorkbot is a modular command-line tool for Google dorking, which is performing vulnerability scans against a set of web pages returned by Google search queries in a given Google Custom Search Engine.
USBPcap - USB Packet Capture For Windows USBPcap – USB Packet Capture For Windows
USBPcap is an open-source USB Packet Capture tool for Windows that can be used together with Wireshark in order to analyse USB traffic without using a Virtual Machine.


Comments are closed.