Features: Data Extraction tool designed for bluetooth hacking
PA168 Web Interface Password Brute Forcer
Features: The following tool can be used to “break” into PA168 based phone’s password protected web interface by brute forcing the password.
Stealing Bluetooth Link Keys
Features: This document describes that there are 2 items required to attack a bluetooth pair The ability to spoof a BD_ADDR and possession of a secret key also known as a Link Key This document discusses the possibilities of obtaining…
HelloMoto
Features: Exploits incorrect implementation of the Trusted Device handle Uses Sending of Vcard to break through and add itself to “trusted devices” Once on trusted device list , Attacker can take control of phone through AT-commands
Green Plaque
Features: This Application simply finds discoverable bluetooth devices Requires the Affix Bluetooth protocol libraries Program will cause damage to the found device. Sister of Redfang which was to find non-discoverable bluetooth devices
Exploiting Open Functionality in SMS-Capable Cellular Network
Features: This is a PDF which describe in detail research which evaluates the security impact of the (SMS) interface on the availability of the cellular phone network. Specifically, it demonstrates the ability to deny voice service to large metropolitan areas…