Categories: Kali Linux

BLEAH – A BLE Scanner For SMART Devices Hacking

BLEAH is a BLE scanner for SMART devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead easy to hack.  This tool can be useful for an Offshore software development company – Rademade.com .

How to Install BLEAH ?

Install bluepy from source:

git clone https://github.com/IanHarvey/bluepy.git
cd bluepy
python setup.py build
sudo python setup.py install

Then install BLEAH:

git clone https://github.com/evilsocket/bleah.git
cd bleah
python setup.py build
sudo python setup.py install

Also Read Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Usage

From the -h help menu:

usage: bleah [-h] [-i HCI] [-t TIMEOUT] [-s SENSITIVITY] [-b MAC] [-f] [-e] [-u UUID] [-d DATA] [-r DATAFILE]

optional arguments:
  -h, --help            show this help message and exit
  -i HCI, --hci HCI     HCI device index.
  -t TIMEOUT, --timeout TIMEOUT
                        Scan delay, 0 for continuous scanning.
  -s SENSITIVITY, --sensitivity SENSITIVITY
                        dBm threshold.
  -b MAC, --mac MAC     Filter by device address.
  -f, --force           Try to connect even if the device doesn't allow to.
  -e, --enumerate       Connect to available devices and perform services
                        enumeration.
  -u UUID, --uuid UUID  Write data to this characteristic UUID (requires --mac
                        and --data).
  -d DATA, --data DATA  Data to be written.
  -r DATAFILE, --datafile DATAFILE
                        Read data to be written from this file.

Examples

Keep scanning for BTLE devices:

sudo bleah -t0

Connect to a specific device and enumerate all the things:

sudo bleah -b "aa:bb:cc:dd:ee:ff" -e

Write the bytes hello world to a specific characteristic of the device:

sudo bleah -b "aa:bb:cc:dd:ee:ff" -u "c7d25540-31dd-11e2-81c1-0800200c9a66" -d "hello world"

R K

Recent Posts

Burrow – Breaking Through Firewalls With Open Source Ingenuity

Burrow is an open source tool for burrowing through firewalls, built by teenagers at Hack Club.…

1 hour ago

Its-A-Trap : Building Secure Web Applications With A Golang Web Server For Authentication

Simple golang webserver that listens for basic auth or post requests and sends a notification…

2 hours ago

Nutek-Apple : Unleashing Power On macOS And Linux

Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and…

2 hours ago

SecureSphere Labs – A Haven For Cybersecurity Innovators And Ethical Hackers

Welcome to SecureSphere Labs, your go-to destination for a curated collection of powerful hacking tools…

2 hours ago

Vulpes/VulpOS : The Docker-Powered All-in-One Workstation For Penetration Testing And Offsec Labs

All in one Docker-based workstation with hacking tools for Pentesting and offsec Labs by maintained…

2 hours ago

LiCo-Extrator : Revolutionizing Icon Extraction Across Platforms

Got it! Below is the updated README.md file with instructions for downloading the project on…

19 hours ago