This video explains how to use a number of utilities to scan for Bluetooth devices and enumerate their information, including hcitool, Bluelog, Btscanner, l2ping, and Redfang.
- [Instructor] To use Bluetooth with Kali…in a virtual environment, we need to have…a USB Bluetooth adapter loaded just like we do for WiFi.…I've added my target USB Bluetooth device…to the Kali VM in VirtualBox,…which I can see if I click on the USB configuration.…The target is shown as a Broadcom Bluetooth device.…I'll open a terminal window and check my USB devices…with the ls USB command.…We're cool, we can see a Broadcom Bluetooth device.…
I'll now see what the Bluetooth…interface is with the hciconfig command,…and we can see hci0 is available for use…with the Bluetooth device address…of 00:19:0E:18:8A:0E.…I can now look for devices using hcitool.…I'll use the --info switch to enumerate the device,…and the --oui switch to tell me what type of device it is.…Okay, we've found three devices.…
The first is my iPhone, with its Bluetooth…device address of 7C:11:BE:CB:25:C2,…and I can see its name, the chip set manufacturer,…and a detailed list of Bluetooth capabilities.…It's also shown that it's manufactured by Apple Inc…
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic WiFi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things