BlueMaho Bluetooth Security Testing Tool

Well blue-tooth is a open wireless protocol to transmit data over short distance, it is basically designed for short distance communication.It operates on the frequency of 2.4GHZ. 

If there are technology means there are some attacks on this technology in this article we will discuss about the BlueMaho an attacking tool that attacks on blue-tooth devices.

BlueMaho is a freeware open source tool that has been written in python, it is used for test the security of the blue-tooth devices, it can be used for finding known and unknown vulnerabilities on a blue-tooth device. It is widely used by penetration tester to evaluate the security. Plate form is Linux and the author is Martin Herfurt.



Key Features
  • It can scan devices around a range.
  • Track devices means if someone change the device name it can track this device too.
  • It can scan all time means loop scan
  • It has an ability to send files
  • It can save the result on database
  • It can check remote devices for vulnerability
  • Customize theme option
  • You can define the command whenever it found new device
  Requirements
  • Operating system(Linux), it has been tested on Debian 4.0 Etch / 2.6.18
  • Python
  • WxPython
  • BlueZ
  • Hardware: any bluez compatible bluetooth-device

Usage
You can find all the configuration on ‘config’ directory, you can run blueMaho by typing ‘bluemaho.py’ on terminal.


Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

LINUX GAME HACKING GUIDE 2021

In the past, most games had cheat codes, yet these days it's more uncommon. As a programmer, I like to perceive how things work,...

Phishing Prevention: How to Secure Your Organization Against Phishing Attacks

Phishing is a type of cyberattack that aims to trick people into giving up their sensitive information or hack into a system by means...

Automated Penetration Testing Prevents High-Risk Vulnerabilities

According to new research from Positive Technologies, a substantial 84% of companies contain high-risk vulnerabilities within their network perimeter. Scanning as many as 3,514...

Security Concerns When You’re Running Your Company From Abroad

The world of technology makes it possible for entrepreneurs to run their businesses from any location worldwide. You could travel and move to any...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.