Automate Cloning of Bluetooth devices

Posted: March 18, 2012 in Penteration Testing, Vulnerabilities

spooftooph+Automate+Cloning+of+Bluetooth+devices

SpoofTooph 0.5 has been updated with some major bug fixes and new features. The new version 0.5 runs scans MUCH faster, which also allows for more Device Names to be resolved during scans.
Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will only list one of the devices if more than one device in range shares the same device information when the devices are in Discoverable Mode (specificaly the same Address).
Change Log v0.5:
– Fixed segmentation fault in manual assigning of Device Name and Class of Device
– Modified flags
– Depreciated
-r: Assign random NAME, CLASS, and ADDR
-l : Load SpoofTooph CSV logfile
-d : Dump scan into SpoofTooph CSV logfile
– New
-w : Write to CSV file
-r : Read from CSV file
-R: Assign random NAME, CLASS, and ADDR
-m: Specify multiple interfaces during selection
-u: USB delay. Interactive delay for reinitializing interfaces
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s