BTCrawler – Bluetooth Diagnostic & Discovery Tool


BTCrawler is an application used to to discover Bluetooth devices and the services they provide, it is useful if you wish to know which Bluetooth enabled devices are in your proximity for debugging, spying, curiosity or any other purpose.

BTCrawler - Bluetooth Diagnostic & Discovery Tool

With this program you’ll be even able to find every service provided by those devices and to list all its Bluetooth attributes.

When the application is started, it firstly enables the Bluetooth service on the device if it was not already on and then it searches for information about all pre-known devices. During those operations a wait screen is shown. Please be patient, because the initial loading can take a little long.

Features

  • List pre-known devices and devices cached by the local Bluetooth implementation;
  • New device discovery;
  • Per device service discovery;
  • Customizable list of discovered services;
  • Complete attribute list for each device or service.

All known properties of any discovered device will be shown. Such properties include:

  • The device name;
  • The device Bluetooth address;
  • The major class of the device;
  • The minor class of the device;
  • The list of classes of service provided by the device.

It will then iterate through the services available on the device, and of those services it will attempt to discover the service attributes of each available service.

You can download BTCrawler here:

BTCrawler.jar

Or read more here.

Posted in: Hacking Tools, Networking Hacking Tools

, ,


Latest Posts:


Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.
LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.
Grype - Vulnerability Scanner For Container Images & Filesystems Grype – Vulnerability Scanner For Container Images & Filesystems
Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based OS.
APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.


Comments are closed.