December 2017
Intermediate to advanced
216 pages
6h 2m
English
In order to carry out a Bluesmack attack we are going to use a part of the built-in BlueZ stack to make things happen. This can be a very effective attack against a Bluetooth device, it can effectively leave the victim no choice but to shut off their device, their Bluetooth, or move out of range.
hciconfig
The results of the command will look something like the following screenshot:

From this screenshot you can see that the Bluetooth adapter is labeled with an address (much like a MAC address on a physical network adapter). ...
Read now
Unlock full access