Skip to content

Using hardware‐based exploits

sgxgsx edited this page May 13, 2024 · 1 revision

Braktooth

You need to buy the following hardware to be able to run the exploits: The installation is partially automated in the toolkit. Consult https://github.com/Matheus-Garbelini/braktooth_esp32_bluetooth_classic_attacks repository for other information.

Once you have needed hardware:

  • you need to connect it to your machine
  • Then run the following command
ls -la /dev/tty*
  • If you see /dev/ttyUSB0 and /dev/ttyUSB1 then the development board is connected and you can start writing to it
  • To continue Braktooth installation run the following commands
chmod +x /usr/share/Btoolkit/installation/braktooth_additional_install.sh
/usr/share/Btoolkit/installation/braktooth_additional_install.sh

Internalblue

Currently, we support only Nexus 5 phones, but you can add your hardware that supports internalblue as well LINK_TO_HOW_TO_ADD_HARDWARE.

The phone should already be set up according to Internalblue recommendations: https://github.com/seemoo-lab/internalblue/tree/master/doc/android.md

On the first run, you might need to allow adb to debug your device and then install a BluetoothAssistant on your mobile device.

Useful commands:

  • would list devices (if needed change your user to root)
adb devices
  • If you are using a VM, use the following command on your host machine, so that it doesn't interfere with the VM
adb kill-server
  • Once prompted with the debug connection - press "Allow always" to save the preference
  • Then you should always see the following information upon running adb devices
List of devices attached
[ID/NAME] device

To install a Bluetooth Assistant you need to have a connected through adb Android device.

  • Then run the following commands
chmod +x /usr/share/Btoolkit/installation/bluetoothassistant_additional_install.sh
/usr/share/Btoolkit/installation/bluetoothassistant_additional_install.sh

Other exploits

Currently, all other exploits are fully automated, except for a few manual exploits.

Clone this wiki locally