7 pagesV  < 1 2 3 4 5 6 > »  
 
REPLY
> Blooover III | Bluetooth hacking
Blooover III
Did you manage to hack any device?
Yes [ 70 ] ** [32,41%]
Not [ 69 ] ** [31,94%]
Nearly [ 72 ] ** [33,33%]
Which version do you think works best?
I [ 12 ] ** [5,56%]
II [ 12 ] ** [5,56%]
III [ 187 ] ** [86,57%]
Should development continue?
Yes [ 208 ] ** [96,3%]
Not [ 7 ] ** [3,24%]
Total votes: 216
 
Gfoxsh
Message#1
21.07.15, 10:15
Brave experimenter
********
[offline]

Group: Curators
Messages 1390
Check in: 12.02.15
Nokia C1-01

Reputation:-  296  +

Blooover III (unofficial) download


Version: 0.01

Last update of the program / game in the header:21.07.2015

Attached Image

Description:
The program is designed to gain access to Bluetooth-devices. It implements almost all types of attacks, namely:

Bluebug
Bluesmack
Bluesnarf
Bluesnarf ++
Helomoto
BlueDump
DoS


I noticed that the J2ME platform supports most attacks. I rather quickly came across Blooover, but (alas!) Its functionality was more than limited. Then I decided to expand it, testing it in combination with various programs, creating so-called "combines". Very soon, I picked up the perfect complement: Super Bluetooth Hack. Further, the choice was for the file manager to implement Bluesnarf ++. The choice fell on the Mini Commander, thanks to its ability to "crush" weak devices with heavy packages (std. 1 KB, uv. 8 KB.), Thereby implementing the BlueSmack attack. BlueDump is realized thanks to the ability of Super Bluetooth Hack to transfer any set of bytes, incl. and fake MAC address. CarWhisperer decided not to implement the attack yet, since Standard pin codes can be searched manually. Thus, the assembly implements all known types of attacks as of 01.02.2011.

When creating the program, the following developer codes were used:Martin Herfur (Blooover II), Yuri kudrin (Mini Commander), Marek sedivy (SBH), YURiQUE (MultiMe).
The author of the assembly is me (Gfoxsh ).

Download:
Attached fileBIIIalpha1.jar(448.95 KB)


Remember! Hacking someone else's devices is illegal! The program is placed strictly for informational purposes and to test the level of protection of your devices!

Post has been editedGfoxsh - 21.08.15, 16:46
Gfoxsh
Message#22
07.08.16, 15:59
Brave experimenter
********
[offline]

Group: Curators
Messages 1390
Check in: 12.02.15
Nokia C1-01

Reputation:-  296  +

* Sekerrrswill not be. There is a compatibility issue.
zXzShadowzXz
Message#23
16.12.16, 15:08
H @ cK
******
[offline]

Group: Friendssavagemessiahzine.com
Messages 544
Check in: 22.09.12
Samsung Galaxy Note 4 SM-N910C

Reputation:-  56  +

GFOXSH @ 07.08.16, 15:59*
will not be. There is a compatibility issue

So just like that, today I just decided to return to my old projects connected with Pentest devices interacting via Bluetooth, and came across your article and the work you did to improve the good old Blooover, for which of course many thanks to you: thank_you:

GFOXSH @ 07.21.15, 10:15*
CarWhisperer decided not to implement the attack yet, since Standard pin codes can be searched manually.

Yes, you can manually, but the attack mechanism itself and the functionality that they have invested in their software for the test of this attack can be expanded, it can be not only headsets or tape recorders, but also radios and much more, you can also try to combine several different vectors in one and so

There is also an idea to add a hidden device scanner, like the RedFang BlueTooth utility.

And now, actually, in the case, you shouldn’t be discouraged, I’m ready to connect to help with porting for android, as I’m programming for android for quite a long time, including using BusyBox capabilities, since there are many useful applets there, and without root don't go anywhere!

Of course, in fact, it will be the same assembly of the main vulnerabilities identified by various Bluetooth devices under Linux, yes it is under Linux with a convenient GUI interface wrapped in an android, and a convenient multi-functional menu, I could continue this project myself, but I think that I’m better I will help you, it will significantly reduce development time.

Post has been editedzXzShadowzXz - 16.12.16, 22:44
bender-rodrigezz2013
Message#24
17.12.16, 12:22
Experienced
******
[offline]

Group: Friendssavagemessiahzine.com
Messages 610
Check in: 26.01.15
Motorola Moto X Play

Reputation:-  56  +

I understand that hope dies last and still wait?
zXzShadowzXz
Message#25
23.01.17, 00:12
H @ cK
******
[offline]

Group: Friendssavagemessiahzine.com
Messages 544
Check in: 22.09.12
Samsung Galaxy Note 4 SM-N910C

Reputation:-  56  +

bender-rodrigezz2013 @ 17.12.16, 12:22*
I understand that hope dies last and still wait?

Of course it is, but we would not refuse to help.

Well, if in essence, from what has already been implemented under android:

- DDoS attack: (relevant only for older versions of bluetooth, new versions of this attack are almost not affected), unlike Blooover II, the new DDoS method uses an increased size of the data packet sent to the device (victim), as well as the main difference from Blooover will be that you can create these data packages yourself, as well as modify them as you please.

- BlueDump (change MAC): also, unlike Blooover, you will be able to independently change the MAC address as you please, with the possibility of backing up the previous MAC address.

PS: on further functionality while working.
I would also like to appeal to all who are interested in this project, please help to find as many "AT" commands as possible for various models of phones / smartphones and all sorts of other Bluetooth devices, such as headsets, radio tape recorders, teapots, multicookers and others, I would be very grateful how it will significantly speed up the development process: thank_you:

NOTE: Any attempt to deliberately hacking someone else's or third-party devices (not belonging to you), are pursued by law in accordance with the legislation of the Russian Federation!
We in no case motivate anyone for any illegal actions!
Development and testing is carried out as part of research conducted in the field of wireless equipment security, and exclusively within the laboratory, using our own devices!


Post has been editedzXzShadowzXz - 31.01.17, 20:57
zXzShadowzXz
Message#26
31.01.17, 19:42
H @ cK
******
[offline]

Group: Friendssavagemessiahzine.com
Messages 544
Check in: 22.09.12
Samsung Galaxy Note 4 SM-N910C

Reputation:-  56  +

Hello again! : thank_you:

As I already said, the development is in full swing, in the process of research I managed to find some new unusual and quite interesting types of attacks on some Bluetooth devices, which I hadn’t heard about before, and I didn’t see anything like it anywhere, although it could be somewhere but at the moment I did not find any information about such manipulations.

In general, the trend is quite interesting, of course, all the most unusual ways and implementations will be added to the application.

PS: I also continue research in the field of various AT Commands, and I would be very grateful if the participants of this topic, as well as interested and interested people in this topic, will help me to collect the list of AT commands for various devices as much as possible.

NOTE: Any attempt to deliberately hacking someone else's or third-party devices (not belonging to you), are pursued by law in accordance with the legislation of the Russian Federation!
We in no case motivate anyone for any illegal actions!
Development and testing is carried out as part of research conducted in the field of wireless equipment security, and exclusively within the laboratory, using our own devices!


Post has been editedzXzShadowzXz - 31.01.17, 20:58
Bal_sasha
Message#27
13.02.17, 07:11
a guest
*
[offline]

Group: Users
Messages 6
Check in: 05.10.14

Reputation:-  1  +

zXzShadowzXz
Message#28
13.02.17, 08:41
H @ cK
******
[offline]

Group: Friendssavagemessiahzine.com
Messages 544
Check in: 22.09.12
Samsung Galaxy Note 4 SM-N910C

Reputation:-  56  +

Bal_sashaThanks a lot, really helped. : thank_you:

Post has been editedzXzShadowzXz - 13.02.17, 08:42
Bal_sasha
Message#29
13.02.17, 15:18
a guest
*
[offline]

Group: Users
Messages 6
Check in: 05.10.14

Reputation:-  1  +

* zXzShadowzXz,np In which topic can you see the program for android ...
zXzShadowzXz
Message#30
13.02.17, 17:54
H @ cK
******
[offline]

Group: Friendssavagemessiahzine.com
Messages 544
Check in: 22.09.12
Samsung Galaxy Note 4 SM-N910C

Reputation:-  56  +

Bal_sasha @ 13.02.17, 15:18*
In which topic can you see a program for android ..

so far in the same topic, perhaps in the future as the update and refinement will create a new topic.

Post has been editedzXzShadowzXz - 13.02.17, 21:15
Dark_Timur
Message#31
22.04.17, 18:49
Experienced
******
[offline]

Group: Friendssavagemessiahzine.com
Messages 448
Check in: 02.06.11
Samsung Galaxy S2 Plus GT-I9105

Reputation:-  62  +

Well, is there any progress?


--------------------
Road going by walking
Idaniar
Message#32
22.04.17, 18:51
Guru
*********
[offline]

Group: Friendssavagemessiahzine.com
Messages 3028
Check in: 18.07.16
Xiaomi Redmi Note 4X Snapdragon 3/32

Reputation:-  211  +

Dark_Timur @ 04/22/17, 9:49 PM*
any progress?
it would be time
UITimaTE
Message#33
25.04.17, 19:04
Experienced
******
[online]

Group: Friendssavagemessiahzine.com
Messages 657
Check in: 23.04.17
Sony Xperia Z3 +

Reputation:-  36  +

* zXzShadowzXzWell, how is it? What percentage did you do? What is missing? I can help (via search engine) ..


--------------------
Recently, I am actively lying on the couch ...
Idaniar
Message#34
10.05.17, 19:07
Guru
*********
[offline]

Group: Friendssavagemessiahzine.com
Messages 3028
Check in: 18.07.16
Xiaomi Redmi Note 4X Snapdragon 3/32

Reputation:-  211  +

Guys and how to use this then attacking Nokia x2-02 attacked gt-c3322i the program tested showed that he was visually and how was it necessary to pull out the data?
firefox337
Message#35
10.07.17, 23:56
Local
*****
[offline]

Group: Friendssavagemessiahzine.com
Messages 260
Check in: 20.10.16
Nokia N8

Reputation:-  12  +

people .... the topic is still alive? or abandoned her?
Idaniar
Message#36
11.07.17, 06:54
Guru
*********
[offline]

Group: Friendssavagemessiahzine.com
Messages 3028
Check in: 18.07.16
Xiaomi Redmi Note 4X Snapdragon 3/32

Reputation:-  211  +

* firefox337Yes, it seems from the author already on the android the release was to follow, we are waiting for it. : D
mikolas2008
Message#37
14.07.17, 13:13
User
****
[offline]

Group: Friendssavagemessiahzine.com
Messages 59
Check in: 12.09.10

Reputation:-  0  +

I look forward to it.
maximpal1996
Message#38
31.08.17, 11:26
a guest
*
[offline]

Group: Users
Messages 1
Check in: 07.03.15

Reputation:-  0  +

Waiting ... Waiting
DeNcHiK6281505
Message#39
13.09.17, 17:58
Local
*****
[offline]

Group: Curators
Messages 196
Check in: 24.05.14
Xiaomi Mi A2 6/128

Reputation:-  102  +

BlueBorne will be?)
kotttaw
Message#40
02.12.17, 13:30
a guest
*
[offline]

Group: Users
Messages 3
Check in: 08.06.17
ZUK Z2 Pro 4/64

Reputation:-  0  +

Well, Che, I've been waiting for two years) Soon?)
Dark_Timur
Message#41
17.12.17, 04:07
Experienced
******
[offline]

Group: Friendssavagemessiahzine.com
Messages 448
Check in: 02.06.11
Samsung Galaxy S2 Plus GT-I9105

Reputation:-  62  +

* kotttaw
* DeNcHiK6281505,
* maximpal1996,
* mikolas2008
* Idaniar
* firefox337
* UITimaTE,

I wrote to the author in the LAN, he unsubscribed that the project is ALIVE and currently exploits are being investigated. So zhdemss

Post has been editedDark_Timur - 17.12.17, 04:07


--------------------
Road going by walking

7 pagesV  < 1 2 3 4 5 6 > » 


 mobile version    Now: 06/18/19, 10:22