The content of the article
In the world there are not many things that infuriate almost everyone without exception. This is spring-autumn slush, summer hot water cut-off and schoolchildren with portable Bluetooth speakers. And if with the first two natural disasters practically nothing can be done, then with the third it is quite possible to fight, and almost without crime. How? We’ll talk about this.
If modern Wi-Fi routers are capable of filtering out unwanted packets, then most Bluetooth adapters are, to say the least, blunt. By and large, they do not care what package and how much, and even more so how many of these packages you send. Therefore, it is absolutely easy for us to increase the information volume of the ping package in Linux to a huge value, and then send these packages to the device with Bluetooth, say, 1000 pieces.
Now in order. First we need to find the right devices in range. To do this, use the command
$ hcitool scan
As a result of this simple manipulation, you will get a list of available devices with Bluetooth from their MAC address. If your system does not see the Bluetooth adapter, then I recommend installing one of the Bluetooth managers for Linux. In Kali, gnome-bluetooth approached me personally, which can be installed with the following command:
$ apt-get install gnome-bluetooth
You can also use the blueman utility:
$ apt-get install blueman
Having received a list of potential victims, you can deal with their blue-tooth devices in several ways. Let's consider each separately.
The first way: l2ping
We use the following command:
$ l2ping -i hci0 -s
It will generate packets specified by you in the parameter
volume and will send these packets to the MAC address recorded as a parameter
. In the end, you will see this picture: in the terminal, the response time will gradually increase, and on the attacked device, most likely, Bluetooth will simply turn off. After some time, it will turn on anyway, but the music will be interrupted, and some satisfaction will be received.
Such a scheme works very well when the device under attack (for example, a telephone) is connected to a headset or speaker via Bluetooth. After the attack, these two devices will not be able to connect to each other.
Continuation is available only to participants
Materials from the latest issues become available separately only two months after publication. To continue reading, you must become a member of the Xakep.ru community.
Join the Xakep.ru Community!
Membership in the community during the specified period will open you access to ALL Hacker materials, increase your personal cumulative discount and allow you to accumulate a professional Xakep Score!
I am already a member of Xakep.ru