Categories: Kali Linux

BLEAH – A BLE Scanner For SMART Devices Hacking

BLEAH is a BLE scanner for SMART devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead easy to hack.  This tool can be useful for an Offshore software development company – Rademade.com .

How to Install BLEAH ?

Install bluepy from source:

git clone https://github.com/IanHarvey/bluepy.git
cd bluepy
python setup.py build
sudo python setup.py install

Then install BLEAH:

git clone https://github.com/evilsocket/bleah.git
cd bleah
python setup.py build
sudo python setup.py install

Also Read Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Usage

From the -h help menu:

usage: bleah [-h] [-i HCI] [-t TIMEOUT] [-s SENSITIVITY] [-b MAC] [-f] [-e] [-u UUID] [-d DATA] [-r DATAFILE]

optional arguments:
  -h, --help            show this help message and exit
  -i HCI, --hci HCI     HCI device index.
  -t TIMEOUT, --timeout TIMEOUT
                        Scan delay, 0 for continuous scanning.
  -s SENSITIVITY, --sensitivity SENSITIVITY
                        dBm threshold.
  -b MAC, --mac MAC     Filter by device address.
  -f, --force           Try to connect even if the device doesn't allow to.
  -e, --enumerate       Connect to available devices and perform services
                        enumeration.
  -u UUID, --uuid UUID  Write data to this characteristic UUID (requires --mac
                        and --data).
  -d DATA, --data DATA  Data to be written.
  -r DATAFILE, --datafile DATAFILE
                        Read data to be written from this file.

Examples

Keep scanning for BTLE devices:

sudo bleah -t0

Connect to a specific device and enumerate all the things:

sudo bleah -b "aa:bb:cc:dd:ee:ff" -e

Write the bytes hello world to a specific characteristic of the device:

sudo bleah -b "aa:bb:cc:dd:ee:ff" -u "c7d25540-31dd-11e2-81c1-0800200c9a66" -d "hello world"

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

3 hours ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

4 hours ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

23 hours ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

23 hours ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

24 hours ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

3 days ago