Dos attack a Bluetooth connection!

Related tags

Networkingbtdos
Overview

Bluetooth Denial of service

Script made for attacking Bluetooth Devices By Samrat Katwal.

Warning

This project was created only for fun purposes and personal use.

Mr. Bastard

Facebook https://www.facebook.com/samrat.katwal.5

To execute

$ sudo apt update
$ sudo apt install python3
$ cd btdos/
$ python3 Bluetooth.py

NOte

The script works only with Linux systems.

You must have "l2ping" util on your linux machine (it installed as default on Kali Linux).

YOU MUST SCAN AND ATTACK BEFORE SOMEONE CONNECTS TO THE TARGET!!!

How's it's tested

Kali Linux as attacker, and JY-25 Bluetooth Speaker as target.

HOw to use

First of all, you must scan network for Bluetooth devises. For example, you can use "hcitool", scan and copy Mac address you may need to execute 'service bluetooth start'.

$ sudo apt update
$ apt install hcitool
$ sudo service bluetooth start
$ hcitool scan

Output will be like:

C1:E4:A4:D3:45      Jy-25
B3:C2:E3:D4:F5      POCO C3
D5:B2:F3:E4:A6      Some Bluetooth device

Then copy target addres (for example "C1:E4:A4:D3:45") and paste it where Mac address is asked.

Tutorial

  1. "Target addr" - addres of your target (Check info above).
  2. "Packages size" - size of the packages, that will be sent to the target. 600 is optimal.
  3. "Threads count" - number of threads, that will send packages to the target at the same time. I used 500 threads, and that was enough. Check the table below, to find optimal value.
Packages size Threads count Ping, ms Distance, meters Time waited, sec Device
600 1 9 0,3 5 JY-25
600 10 38 0,3 5 JY-25
600 20 78 0,3 5 JY-25
600 50 229 0,3 5 JY-25
600 100 413 0,3 5 JY-25
600 200 806 0,3 5 JY-25
600 500 1961 0,3 5 JY-25
600 1000 6621 0,3 5 JY-25
600 1000+ ... 0,3 5 JY-25

What happened to the target

I haven't tested on all devices, but the device i used worked perfecly.

Owner
Samrat
Beginner
Samrat
This is the code repository for the USENIX Security 2021 paper, "Weaponizing Middleboxes for TCP Reflected Amplification".

weaponizing-censors Censors pose a threat to the entire Internet. In this work, we show that censoring middleboxes and firewalls can be weaponized by

UMD Breakerspace 119 Dec 31, 2022
GlokyPortScannar is a really fast tool to scan TCP ports implemented in Python.

GlokyPortScannar is a really fast tool to scan TCP ports implemented in Python. Installation: This program requires Python 3.9. Linux

gl0ky 5 Jun 25, 2022
Port Traffic/Bandwidth Monitor Script

python-switch-port-traffic-alarm Port Traffic/Bandwidth Monitor Script That's an Switch Port Traffic monitor program is checking the switch uplink por

goksinenki 4 Sep 02, 2021
Transfer files to and from a Windows host via ICMP in restricted network environments.

ICMP-TransferTools ICMP-TransferTools is a set of scripts designed to move files to and from Windows hosts in restricted network environments. This is

icyguider 269 Dec 20, 2022
πŸ₯‘ A Python ARP and DNS Spoofer CLI and INTERFACE πŸ₯“

NEXTGEN SPOOFER πŸ₯‘ A Python ARP and DNS Spoofer CLI and INTERFACE πŸ₯“ CLI - advanced pentesters INTERFACE - beginners SetUp Make sure you installed P

9 Dec 25, 2022
πŸ› Self spreading Botnet based on Mirai C&C Arch, spreading through SSH and Telnet protocol.

HBot Self spreading Botnet based on Mirai C&C Arch, spreading through SSH and Telnet protocol. Modern script fullly written in python3. Warning. This

Ρ΄ΞΉcΠ½Ρ‡ 137 Nov 14, 2022
A Simple but Powerful cross-platform port scanning & and network automation tool.

DEDMAP is a Simple but Powerful, Clever and Flexible Cross-Platform Port Scanning tool made with ease to use and convenience in mind. Both TCP

Anurag Mondal 30 Dec 16, 2022
A library for interacting with APNs and VoIP using HTTP/2.

kalyke A library for interacting with APNs and VoIP using HTTP/2. Installation kalyke requires python 3.6 or later. $ pip install kalyke-apns Usage AP

Yuya Oka 11 Dec 08, 2022
An ansible playbook to set up wireguard server.

Poor man's VPN (pay for only what you need) An ansible playbook to quickly set up Wireguard server for occasional personal use. It takes around five m

Amrit Bera 613 Dec 25, 2022
Connection package to a raspberry or any other machine using ssh, it simplifies the deployment scripts and monitoring.

Connection package to a raspberry or any other machine using ssh, it simplifies the deployment scripts and monitoring.

Dashstrom 7 Mar 29, 2022
A live streaming chatroom involving multiple modalities, such as voice, gesture, and facial expression

HiLive A live streaming chatroom involving multiple modalities, such as voice, gesture, and facial expression. Introduction We focus on demonstrating

Ryan Yen 2 Dec 02, 2021
A repository dedicated to IoT(internet of things ) and python scripts

πŸ“‘ Introduction Week of Learning is a weekly program in which you will get all the necessary knowledge about Circuit-Building, Arduino and Micro-Contr

27 Nov 22, 2022
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS.

What is DNSStager? DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS. DNSStager will create a malic

Askar 547 Dec 20, 2022
Simple P2P application for sending files over open and forwarded network ports.

FileShareV2 A major overhaul to the V1 (now deprecated) FileShare application. V2 brings major improvements in both UI and performance. V2 is now base

Michael Wang 1 Nov 23, 2021
WebRTC and ORTC implementation for Python using asyncio

aiortc What is aiortc? aiortc is a library for Web Real-Time Communication (WebRTC) and Object Real-Time Communication (ORTC) in Python. It is built o

3.2k Jan 07, 2023
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.

A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.

George O 929 Jan 01, 2023
EV: IDS Evasion via Packet Manipulation

EV: IDS Evasion via TCP/IP Packet Manipulation δΈ­ζ–‡ζ–‡ζ‘£ Introduction EV is a tool that allows you crafting TCP packets and leveraging some well-known TCP/

256 Dec 08, 2022
Program can control your server via discord bot

GTPS Controller Program can control your server via discord bot Require Python How To Use Download This Source Extract The Zip File Paste gtps.py to y

Lamp 2 Mar 15, 2022
InfraGenie is allows you to split out your infrastructure project into separate independent pieces, each with its own terraform state.

🧞 InfraGenie InfraGenie is allows you to split out your infrastructure project into separate independent pieces, each with its own terraform state. T

Digger 53 Nov 23, 2022
PoC code for stealing the WiFi password of a network with a Lovebox IOT device connected

LoveBoxer PoC code for stealing the WiFi password of a network with a Lovebox IOT device connected. This PoC was is what I used in this blogpost Usage

Graham Helton 10 May 24, 2022