# Bluetooth Attacks

## <mark style="color:blue;">Overview</mark>

Bluetooth attacks refer to unauthorized actions or exploits targeting Bluetooth-enabled devices to gain unauthorized access, control, or extract sensitive information. These attacks can exploit vulnerabilities in the Bluetooth protocol or implementation to compromise the security and privacy of Bluetooth devices.

## <mark style="color:blue;">Common Bluetooth attacks</mark>

* Bluejacking: Sending unsolicited messages or spam to Bluetooth devices in close proximity.
* Bluesnarfing: Unauthorized access to the data on a Bluetooth-enabled device, such as contacts, messages, or other personal information.
* Bluebugging: Gaining complete control over a Bluetooth device, allowing the attacker to make calls, send messages, or access data without the user's knowledge.
* Bluetooth Denial of Service (DoS): Flooding a Bluetooth device with connection requests or malformed packets, causing it to become unresponsive or crash.
* Man-in-the-Middle (MITM) Attack: Intercepting and altering Bluetooth communication between two devices to eavesdrop on or modify the exchanged data.
* Bluetooth Impersonation Attacks: Pretending to be a trusted Bluetooth device to deceive the target device and gain unauthorized access.

## <mark style="color:blue;">Bluetooth Adaptors</mark>

### <mark style="color:blue;">GreatScottGadgets Ubertooth One</mark>

Ubertooth One is an open source 2.4 GHz wireless development platform suitable for Bluetooth experimentation. Ubertooth One ships with a 2.4 GHz dipole antenna with an RP-SMA connector.

{% embed url="<https://greatscottgadgets.com/ubertoothone/>" %}

{% embed url="<https://docs.hak5.org/ubertooth-one/>" %}

### <mark style="color:blue;">Multiblue Dongle</mark>

{% embed url="<https://www.amazon.in/MultiBlue-Dongle-BlueTooth-Keyboard-BT300KMS/dp/B00CRY5K16>" %}

### <mark style="color:blue;">CC2450 USB Dongle</mark>

{% embed url="<https://www.amazon.com/Bluetooth-Dongle-Development-Evaluation-UDK-CC2540/dp/B079BQC85G>" %}

### <mark style="color:blue;">Tindie/AprilBrother ABSniffer UART Module</mark>

{% embed url="<https://www.tindie.com/products/aprbrother/absniffer-uart-module-ibeacon-502-dongle-receiver/>" %}

{% embed url="<https://wiki.aprbrother.com/en/ABSniffer_USB_Dongle_502.html#descrption>" %}

### <mark style="color:blue;">Panda Dongle</mark>

{% embed url="<https://www.amazon.com/Panda-Bluetooth-4-0-Nano-Adapter/dp/B00BCU4TZE>" %}

### <mark style="color:blue;">Aliexpress dongels</mark>

{% embed url="<https://ar.aliexpress.com/item/1005001781383090.html>" %}

{% embed url="<https://ar.aliexpress.com/item/1005003059503668.html>" %}

{% embed url="<https://ar.aliexpress.com/item/1005005062477851.html>" %}

## <mark style="color:blue;">Tools</mark>

### <mark style="color:blue;">Hcitool</mark>

{% embed url="<https://null-byte.wonderhowto.com/how-to/bt-recon-snoop-bluetooth-devices-using-kali-linux-0165049/>" %}

### <mark style="color:blue;">Bettercap</mark>

{% embed url="<https://null-byte.wonderhowto.com/how-to/target-bluetooth-devices-with-bettercap-0194421/>" %}

### <mark style="color:blue;">BrakTooth</mark>

{% embed url="<https://github.com/Matheus-Garbelini/braktooth_esp32_bluetooth_classic_attacks>" %}

{% embed url="<https://asset-group.github.io/disclosures/braktooth/>" %}

### <mark style="color:blue;">Bluesmack</mark>

{% embed url="<https://github.com/crypt0b0y/BLUETOOTH-DOS-ATTACK-SCRIPT>" %}

### <mark style="color:blue;">Bluetoothctl</mark>

{% embed url="<https://www.makeuseof.com/manage-bluetooth-linux-with-bluetoothctl/>" %}

### <mark style="color:blue;">Spooftooph</mark>

{% embed url="<https://www.kali.org/tools/spooftooph/>" %}

### <mark style="color:blue;">Blueborne</mark>

{% embed url="<https://www.armis.com/research/blueborne/>" %}

### <mark style="color:blue;">Bluesniff</mark>

{% embed url="<https://github.com/mrx04programmer/Bluesniff>" %}

### <mark style="color:blue;">Bluesnarfing</mark>

{% embed url="<https://www.makeuseof.com/what-is-bluesnarfing/>" %}

### <mark style="color:blue;">Bluejacking</mark>

{% embed url="<https://www.makeuseof.com/bluejacking-hack-your-devices/>" %}

### <mark style="color:blue;">More Tools</mark>

{% embed url="<https://www.tutorialspoint.com/wireless_security/wireless_security_bluetooth_hacking_tools.htm>" %}

{% embed url="<https://hardwear.io/usa-2019/presentations/Bluetooth-Hacking-Mike%20Ryan-hardwear-io-usa-2019.pdf>" %}

## <mark style="color:blue;">Protect yourself from Bluetooth attacks</mark>

To protect yourself from Bluetooth attacks, consider the following measures:

* Keep your Bluetooth devices updated with the latest firmware and security patches.
* Disable Bluetooth when not in use or set it to "non-discoverable" mode.
* Avoid pairing with unknown or untrusted Bluetooth devices.
* Use strong and unique PINs or passwords for Bluetooth device pairing.
* Be cautious of suspicious or unexpected Bluetooth connection requests or messages.
* Regularly review and manage the list of paired Bluetooth devices on your device.
* Use Bluetooth in secure environments and be aware of the potential risks in public or crowded areas.

It's important to stay informed about the latest security recommendations and best practices to protect yourself from Bluetooth attacks, as vulnerabilities and attack techniques may evolve over time.

{% embed url="<https://build38.com/prevent-bluetooth-attacks/>" %}
