Difference between revisions of "Bluetooth Pentesting Tools (HW/SW)"
Line 43: | Line 43: | ||
hcitool lescan | hcitool lescan | ||
=== bettercap === | |||
In order to complete these steps, you must have followed [[Install_Bettercap_on_Kali_Linux]] before. | |||
Bettercap is a powerful tool for Wifi, Bluetooth LE or ethernet hijacking and provides tools for MITM attacks. Bettercap can also be used to gather informations about bluetooth devices like shown below: | |||
== Capturing bluetooth traffic == | == Capturing bluetooth traffic == | ||
Line 62: | Line 70: | ||
[[File:Wiresharkhciscan.PNG]] | [[File:Wiresharkhciscan.PNG]] | ||
== Bluetooth Pentesting Software == | |||
== Bluetooth Pentesting Hardware == | == Bluetooth Pentesting Hardware == | ||
Line 79: | Line 78: | ||
For hardware pentesting devices like the Ubertooth one please see following documentations: | For hardware pentesting devices like the Ubertooth one please see following documentations: | ||
* [[Bluetooth_Sniffing_with_Ubertooth:_A_Step-by-step_guide]] | |||
* [[Bluetooth_Hacking_Ubertooth]] | * [[Bluetooth_Hacking_Ubertooth]] | ||
Another BLE penetration testing example with the powerful GATT Tool can be found here: | Another BLE penetration testing example with the powerful GATT Tool can be found here: |
Revision as of 17:52, 17 February 2020
Summary
This article describes various tools for bluetooth penetration testing and aims to provide an overview to choose the right tool for a use case.
Requirements
- Operating system: Kali Linux amd64 2019.2
- Packages: Individual shown for each tool
In order to use hardware pentesting devices a dedicated installation of kali linux is recommended but it is also possible to use hypervisors which are capable of passing USB devices from the host- to the guestsystem e.g. VMWare Workstation or the free hypervisor VirtualBox.
Information gathering
The offical linux bluetooth protocol stack BlueZ is already installed on kali linux but can be installed on other linux maschines with:
apt install -y bluez bluez-utils systemctl start bluetooth.service systemctl status bluetooth.service
Scanning for bluetooth devices
To start with penetration testing we need to gather information about our environment, for this purpose scan for available bluetooth devices with the included packages 'hcitool' or 'bluetoothctl'.
First check if your bluetooth device is available:
hciconfig
Scan for BR/EDR Bluetooth devices with hcitool:
hcitool scan
Alternatively you can use bluetoothctl:
In order to scan for BLE devices use:
hcitool lescan
bettercap
In order to complete these steps, you must have followed Install_Bettercap_on_Kali_Linux before.
Bettercap is a powerful tool for Wifi, Bluetooth LE or ethernet hijacking and provides tools for MITM attacks. Bettercap can also be used to gather informations about bluetooth devices like shown below:
Capturing bluetooth traffic
btmon
With the preinstalled package 'btmon' it is possible to capture traffic between the HCI and the controller:
btmon --write ~/Documents/bttraffic.snoop
These files can be viewed and analysed with 'Wireshark' which is also preinstalled on kali linux.
Wireshark
Alternatively you can capture bluetooth traffic directly with Wireshark. Start Wireshark with:
wireshark -w ~/Documents/bttraffic.snoop
Bluetooth Pentesting Software
Bluetooth Pentesting Hardware
For hardware pentesting devices like the Ubertooth one please see following documentations:
Another BLE penetration testing example with the powerful GATT Tool can be found here: