Ubertooth
- For docs go to the source. Lots of outdated info floating around the Internet: https://github.com/greatscottgadgets/ubertooth/
- Yes, first step is to update the firmware.
- hardware: various all over the world, Amazon too. Cheapest (2017, $120 shipped): https://www.sparkfun.com/products/10573
- You will also want a normal bluetooth interface. Built in, or "Amazon Basics" work. I like to have a dedicated one.
Setup:
The official page, very clear, always current: https://github.com/greatscottgadgets/ubertooth/
Random ref:
-
Duo: An Analysis of BlueBorne: Bluetooth Security Risks https://duo.com/blog/an-analysis-of-blueborne-bluetooth-security-risks
-
NIST - guide to bluetooth security http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2.pdf
-
Thesis: Bluetooth pairing security - threats and countermeasures https://www.uef.fi/en/-/bluetooth-pariliitosprosessin-turvallisuutta-voidaan-parantaa-uusilla-menetelmilla
-
Blue picking – hacking Bluetooth Smart Locks https://smartlockpicking.com/slides/HITB_AMS_2017_Blue_Picking_-_Hacking_Bluetooth_Smart_Locks.pdf
-
Bluetooth low energy wardriving: https://www.davidsopas.com/ble-driving-101/
-
Michael Ossmann - Shmoocon 2010: Bluetooth Keyboards: Who Owns Your Keystrokes? https://www.youtube.com/watch?v=X0RUN6SB6c8
-
Mike Ryan, iSEC Partners - Bluetooth: With Low Energy Comes Low Security https://www.usenix.org/conference/woot13/workshop-program/presentation/ryan
-
MIT 6.858: Hacking Bluetooth http://css.csail.mit.edu/6.858/2012/projects/echai-bendorff-cathywu.pdf
-
John Abraham: Analyzing Bluetooth Advertising with Ubertooth http://j2abro.blogspot.com.au/2014/06/analyzing-bluetooth-advertising-with.html
-
DEF CON 24 - Marc Newlin - MouseJack: Injecting Keystrokes into Wireless Mice https://www.youtube.com/watch?v=00A36VABIA4