BTCrawler – Bluetooth Diagnostic & Discovery Tool


BTCrawler is an application used to to discover Bluetooth devices and the services they provide, it is useful if you wish to know which Bluetooth enabled devices are in your proximity for debugging, spying, curiosity or any other purpose.

BTCrawler - Bluetooth Diagnostic & Discovery Tool

With this program you’ll be even able to find every service provided by those devices and to list all its Bluetooth attributes.

When the application is started, it firstly enables the Bluetooth service on the device if it was not already on and then it searches for information about all pre-known devices. During those operations a wait screen is shown. Please be patient, because the initial loading can take a little long.

Features

  • List pre-known devices and devices cached by the local Bluetooth implementation;
  • New device discovery;
  • Per device service discovery;
  • Customizable list of discovered services;
  • Complete attribute list for each device or service.

All known properties of any discovered device will be shown. Such properties include:

  • The device name;
  • The device Bluetooth address;
  • The major class of the device;
  • The minor class of the device;
  • The list of classes of service provided by the device.

It will then iterate through the services available on the device, and of those services it will attempt to discover the service attributes of each available service.

You can download BTCrawler here:

BTCrawler.jar

Or read more here.

Posted in: Hacking Tools, Networking Hacking

, ,


Latest Posts:


Mosca - Manual Static Analysis Tool To Find Bugs Mosca – Manual Static Analysis Tool To Find Bugs
Mosca is a manual static analysis tool written in C designed to find bugs in the code before it is compiled, much like a grep unix command.
Slurp - Amazon AWS S3 Bucket Enumerator Slurp – Amazon AWS S3 Bucket Enumerator
Slurp is a blackbox/whitebox S3 bucket enumerator written in Go that can use a permutations list to scan externally or an AWS API to scan internally.
US Government Cyber Security Still Inadequate US Government Cyber Security Still Inadequate
Surprise, surprise, surprise - an internal audit of the US Government cyber security situation has uncovered widespread weaknesses, legacy systems and poor adoption of cyber controls and tooling.
BloodHound - Hacking Active Directory Trust Relationships BloodHound – Hacking Active Directory Trust Relationships
BloodHound is for hacking active directory trust relationships and it uses graph theory to reveal the hidden and often unintended relationships within an AD environment.
SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.


Comments are closed.