CIP Cyber

BlueMaho Bluetooth Security Testing Tool

Table of Contents

Well blue-tooth is a open wireless protocol to transmit data over short distance, it is basically designed for short distance communication.It operates on the frequency of 2.4GHZ. 

If there are technology means there are some attacks on this technology in this article we will discuss about the BlueMaho an attacking tool that attacks on blue-tooth devices.

BlueMaho is a freeware open source tool that has been written in python, it is used for test the security of the blue-tooth devices, it can be used for finding known and unknown vulnerabilities on a blue-tooth device. It is widely used by penetration tester to evaluate the security. Plate form is Linux and the author is Martin Herfurt.



Key Features
  • It can scan devices around a range.
  • Track devices means if someone change the device name it can track this device too.
  • It can scan all time means loop scan
  • It has an ability to send files
  • It can save the result on database
  • It can check remote devices for vulnerability
  • Customize theme option
  • You can define the command whenever it found new device
  Requirements
  • Operating system(Linux), it has been tested on Debian 4.0 Etch / 2.6.18
  • Python
  • WxPython
  • BlueZ
  • Hardware: any bluez compatible bluetooth-device

Usage
You can find all the configuration on ‘config’ directory, you can run blueMaho by typing ‘bluemaho.py’ on terminal.


Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Sunset: Dusk VM walkthrough

Sunset: dusk is a vulnerable by design Debian based machine created by whitecrOwz. It is available on https://www.vulnhub.com This machine is ranked as a beginner

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings