Here is the list of tools that commonly use in security auditing of bluetooth devices and networks.
As to the code, everything on our list is Open Source and is distributed under GPL, BSD or similar licenses. Close Source tools are not included on purpose, even though they may be mentioned in the book where appropriate. This work is not commercial, does not favour particular vendors, and has only became possible due to the work and collaboration within the Open Source community. We are profoundly grateful to the authors of the listed tools for the feats of wonder they performed to make "theoretical" wireless security practical.
Bluetooth Network Discovery and related tools - the "classical" tools for discovering bluetooth networks and devices.
|Blooover||Local mirror||v Unknown|
|BlueAlert||Not mirrored||v Unknown|
|BlueSpam||Local mirror||v Unknown|
|Bluetest||Local mirror||v Unknown|
|BTclass||Local mirror||v 0.1 beta|
|BT Device Viewer||Local mirror||v 0.19a|
|BT Device Viewer||Not Mirrored|
|BTfs||Local mirror||v 0.0.3|
|BT (JABWT) Browser||Local mirror||v Unknown|
|BT Location Tracker||Not mirrored||v 015|
|BT Phone book dumper||Local mirror||v0.3|
|Gnome Bluetooth Subsystem||Not mirrored||v 0.4.1|
Bluetooth drivers and stack - this section includes drivers for various bluetooth cards and bluetooth stacks.
|Broadcom Bluetooth driver||not mirrored|
Home » Unlabelled » Bluetooth security tools
When you need an alarm system for your home or office the best one you can get is the wireless alarm system. These systems are becoming very...
The Galaxy Ace is aimed at those who are looking to own an Android phone on a budget. SAMSUNG is looking to repeat the success of its Galaxy...
It´s a solid phone physically and in performance. I thinks the Nokia E5 is pretty tempting for those on a tight budget. The Nokia E5 is a st...
The first Android 3.0 Tablet computer is here. Will the Motorola Xoom be able to take on the iPad 2? I don't think so... The Motorola Xo...
Script kiddies are always looking for new exploits which are unknown to the public, and hence particularly effective. Such exploits are leak...
The XtremeMac Tango TRX 2.1 Bluetooth audio system allows users of iPhone, iPad and iPod touch (2nd gen) to stream their favourite songs wir...