CHAPTER 8BLUETOOTH SCANNING AND RECONNAISSANCE
Like any successful hack, the attack phase includes gaining an understanding of the technology behind your target, scanning and reconnaissance analysis, and concludes with attack and exploitation. In this chapter, we’ll examine the core concepts of the Bluetooth specification, followed by a look at the tools and techniques for Bluetooth scanning and reconnaissance. This chapter covers finding a good Bluetooth adapter (as well as a good driver), multiple options for identifying Bluetooth devices near you, and steps for assessing a target once you find it. We’ll also examine techniques for leveraging OS-native and third-party tools for Bluetooth scanning with active scanners, tools for mobile platforms, ...
Get Hacking Exposed Wireless, Second Edition, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.