Identify a Bluetooth chip without physical interaction: research and tools for Bluetooth device recon for future attacks. 👨🏻💻🛜🛴💡🎯
Would you like to know which Bluetooth chip is inside this device without opening it up? Security researcher Xeno Kovah presents his new research (and tool) that collects Bluetooth identifiers, which you can also share with the community.
Sounds practical and time-saving - rather than disassembling and identifying the chip, you can run the Python-based tool, collect the identifiers, check them against the database of IDs, and - voilà!
I hope Xeno will be able to build a community around this tool, and that the database of identifiers will help future security researchers make new and interesting discoveries!
Enjoy the read, and if you're into Bluetooth hacking, this is definitely a tool to try in your lab. If you’ve already tried it, please share your results!
Thanks! :)
More details:
Crowdsourcing Bluetooth identity, to understand Bluetooth vulnerability [PDF]: https://drive.google.com/file/d/1kFx6h2NGLB8HkVo6eXKzvvd5U0QPVHYK/view
Blue2thPrintingTool [Github]: https://github.com/darkmentorllc/Blue2thprinting


