In this video, discover how to use a number of utilities to scan for Bluetooth devices and enumerate their information, including hcitool, Bluelog, Btscanner, l2ping, and Redfang.
- [Tutor] To use Bluetooth with Kali … in a virtual environment we need to have … a USB Bluetooth adapter loaded, just like we do for Wi-Fi. … I've added my Targus USB Bluetooth device … to the Kali VM in VirtualBox, … which I can see if I click on the USB configuration. … The Targus is shown as a Broadcom Bluetooth device. … I'll open a terminal window … and check my USB devices with the lsusb command. … We're cool, we can see a Broadcom Bluetooth device. … I'll now see what the Bluetooth interface … is with the hciconfig command, … and we can see hci0 is available for use … with a Bluetooth device address of 00 19 0E 18 8A 0E. … I can now look for devices using hcitool. … I'll use the minus minus info switch enumerate the device … and the minus minus oui switch … to tell me what type of device it is. … Okay, we found three devices. … The first is my iPhone with this Bluetooth device address … of 7C 11 BE CB 25 C2, … and I can see its name, the chip set manufacturer, … and a detailed list of Bluetooth capabilities. …
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic Wi-Fi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things