BLEAH is a BLE scanner for SMART devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead easy to hack. This tool can be useful for an Offshore software development company – Rademade.com .
Install bluepy from source:
git clone https://github.com/IanHarvey/bluepy.git
cd bluepy
python setup.py build
sudo python setup.py install
Then install BLEAH:
git clone https://github.com/evilsocket/bleah.git
cd bleah
python setup.py build
sudo python setup.py install
Also Read Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack
From the -h
help menu:
usage: bleah [-h] [-i HCI] [-t TIMEOUT] [-s SENSITIVITY] [-b MAC] [-f] [-e] [-u UUID] [-d DATA] [-r DATAFILE]
optional arguments:
-h, --help show this help message and exit
-i HCI, --hci HCI HCI device index.
-t TIMEOUT, --timeout TIMEOUT
Scan delay, 0 for continuous scanning.
-s SENSITIVITY, --sensitivity SENSITIVITY
dBm threshold.
-b MAC, --mac MAC Filter by device address.
-f, --force Try to connect even if the device doesn't allow to.
-e, --enumerate Connect to available devices and perform services
enumeration.
-u UUID, --uuid UUID Write data to this characteristic UUID (requires --mac
and --data).
-d DATA, --data DATA Data to be written.
-r DATAFILE, --datafile DATAFILE
Read data to be written from this file.
Keep scanning for BTLE devices:
sudo bleah -t0
Connect to a specific device and enumerate all the things:
sudo bleah -b "aa:bb:cc:dd:ee:ff" -e
Write the bytes hello world
to a specific characteristic of the device:
sudo bleah -b "aa:bb:cc:dd:ee:ff" -u "c7d25540-31dd-11e2-81c1-0800200c9a66" -d "hello world"
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…