Categories: Kali Linux

BLEAH – A BLE Scanner For SMART Devices Hacking

BLEAH is a BLE scanner for SMART devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead easy to hack.  This tool can be useful for an Offshore software development company – Rademade.com .

How to Install BLEAH ?

Install bluepy from source:

git clone https://github.com/IanHarvey/bluepy.git
cd bluepy
python setup.py build
sudo python setup.py install

Then install BLEAH:

git clone https://github.com/evilsocket/bleah.git
cd bleah
python setup.py build
sudo python setup.py install

Also Read Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Usage

From the -h help menu:

usage: bleah [-h] [-i HCI] [-t TIMEOUT] [-s SENSITIVITY] [-b MAC] [-f] [-e] [-u UUID] [-d DATA] [-r DATAFILE]

optional arguments:
  -h, --help            show this help message and exit
  -i HCI, --hci HCI     HCI device index.
  -t TIMEOUT, --timeout TIMEOUT
                        Scan delay, 0 for continuous scanning.
  -s SENSITIVITY, --sensitivity SENSITIVITY
                        dBm threshold.
  -b MAC, --mac MAC     Filter by device address.
  -f, --force           Try to connect even if the device doesn't allow to.
  -e, --enumerate       Connect to available devices and perform services
                        enumeration.
  -u UUID, --uuid UUID  Write data to this characteristic UUID (requires --mac
                        and --data).
  -d DATA, --data DATA  Data to be written.
  -r DATAFILE, --datafile DATAFILE
                        Read data to be written from this file.

Examples

Keep scanning for BTLE devices:

sudo bleah -t0

Connect to a specific device and enumerate all the things:

sudo bleah -b "aa:bb:cc:dd:ee:ff" -e

Write the bytes hello world to a specific characteristic of the device:

sudo bleah -b "aa:bb:cc:dd:ee:ff" -u "c7d25540-31dd-11e2-81c1-0800200c9a66" -d "hello world"

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago