Jump to content

Search the Community

Showing results for tags 'bluetooth'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • New USB Rubber Ducky
    • WiFi Pineapple
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
    • WiFi Coconut
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Legacy Devices
    • Classic USB Rubber Ducky
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 18 results

  1. Hi guys, I've been playing around trying to create a Bluetooth version of Rubber Ducky working. Not sure how useful that would be, but I'm in the very early stages. Have been experimenting with this beauty: BBC micro:bit Most 11/12 year olds in the UK will have received one of these in school last year. The BBC ran a programme that allowed schools to apply for free micro:bits for all of Year 7 (6th grade). There's a friendly online interface to program them in Python, but you can actually compile C++ for these badboys. They're available for under £15 / $18: http://microbit.org/resellers/, hence making good little gadgets to mess around with for a BT Rubber Ducky. The micro:bit has a few pins available, a USB port, a small bluetooth antenna, it's very small and can be battery powered (or USB powered). On the front there are 15 LED lights and two buttons to play with: You can program the micro:bit to connect via Bluetooth, with little security (no PIN or anything). Then you can use the two buttons to send commands to the computer or smartphone. At the moment, I'm only able to send ASCII commands, so I've been mapping out the special commands in an ASCII/latin table. I haven't yet figured out how to use the Windows key, but I have managed to take a screenshot ("\x8C") and save a file with the name pwned ("\x99,s,pwned,\n"). Sample file available here, just drag and drop it onto your micro:bit, connect to 'ducky' via BT, the left button will take screenshots, the right button will save files. Code is available here, hopefully others will be able to assist with this experiment :).
  2. Whether you've got questions, spotted a bug, have a new idea for a feature or just want to share your opinion, this is the place to share it. Your comments are the lifeblood that drives my ongoing work on the project. BlueBunny on GitHub
  3. Hello Everyone, I wrote a blog on my finding with a Smart LED Light bulb which uses Bluetooth Low Energy protocol, which i was able to reverse Engineer using no extra tool/hardware like BLE Sniffers. Check out the original blog post here: http://iayanpahwa.github.io/Reverse-Engineering-IoT-Devices/
  4. Hello all, I am a noob when it comes to the ubertooth, and bluetooth in general, and I was just wondering if anyone out there has any recommendations or tips. I have it currently set up with wireshark on a raspbery pi 3 b+ with raspbian. spectrum analyzer works great and I am getting packets coming through in wireshark. The problem is that I really don't know what I am looking at or what data would even be interesting to see. I am currently build a lab for students to sniff bluetooth with the ubertooth using wireshark, as well as a lab for bluetooth tracking such as I saw on a youtube video about blue hydra. If anyone has more in-depth knowledge or just some ideas on how to make this a reality I would really appreciate it!
  5. Hope someone can help me....... I used CVE-2017-0785 to exploit my neighbours SmartTV...... It gave me this out ---> sudo python CVE-2017-0785.py TARGET=CC:B1:1A:F6:D7:76 [!] Pwntools does not support 32-bit Python. Use a 64-bit release. [+] Exploit: Done 00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 │····│····│····│····│ * 00000020 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 01 │····│····│····│····│ 00000030 b5 69 01 00 b4 8f e9 c0 00 00 00 00 b5 54 fe a3 │·i··│····│····│·T··│ 00000040 00 00 00 06 b5 69 39 70 b4 8f e9 e0 b5 60 61 38 │····│·i9p│····│·`a8│ 00000050 b5 60 61 38 b5 69 39 70 b5 69 39 64 b5 69 5a a4 │·`a8│·i9p│·i9d│·iZ·│ 00000060 b4 8f e9 f8 00 00 00 00 b5 69 5a a4 00 00 00 41 │····│····│·iZ·│···A│ 00000070 b4 8f eb 84 b5 54 e6 f9 b5 60 61 38 b5 69 41 78 │····│·T··│·`a8│·iAx│ 00000080 b4 8f ea 08 b5 56 e0 4f b4 8f ea 10 b5 54 57 fd │····│·V·O│····│·TW·│ 00000090 00 00 00 00 b5 69 41 60 b5 56 79 59 b5 69 39 64 │····│·iA`│·VyY│·i9d│ 000000a0 b4 8f ea 30 00 00 00 18 b4 8f ea d0 b5 54 ca c3 │···0│····│····│·T··│ 000000b0 b5 69 41 60 00 00 00 05 b5 60 61 38 b4 8f ea 58 │·iA`│····│·`a8│···X│ 000000c0 00 00 00 18 b4 8f ea d0 b5 69 39 64 b5 54 d2 bf │····│····│·i9d│·T··│ 000000d0 00 00 00 00 b4 30 04 90 00 00 00 00 42 27 e0 00 │····│·0··│····│B'··│ 000000e0 00 00 00 00 b5 69 39 64 00 00 00 08 00 00 00 01 │····│·i9d│····│····│ 000000f0 b4 30 04 90 b4 8f ea d0 00 00 00 41 b5 69 39 64 │·0··│····│···A│·i9d│ 00000100 b4 8f ea a8 b5 69 41 60 00 00 00 03 b5 69 39 64 │····│·iA`│····│·i9d│ 00000110 b5 60 61 38 b4 30 c8 d8 b4 8f ea a0 b5 56 e0 4f │·`a8│·0··│····│·V·O│ 00000120 b4 8f ea a8 b5 56 f6 21 b4 30 c8 d8 41 02 6f 10 │····│·V·!│·0··│A·o·│ 00000130 b4 8f ea b8 b5 50 a1 b7 21 00 00 14 0e 0a 24 00 │····│·P··│!···│··$·│ 00000140 b5 60 61 38 b5 69 ab 60 b4 8f ea d0 b5 56 e0 4f │·`a8│·i·`│····│·V·O│ 00000150 b4 8f ea d8 b5 69 ab 58 b3 6d d4 87 00 00 00 00 │····│·i·X│·m··│····│ 00000160 b4 8f ea f8 00 00 00 02 00 00 00 10 b3 6d f4 b0 │····│····│····│·m··│ 00000170 b5 60 61 38 b5 56 d2 45 b4 8f eb 10 00 00 00 00 │·`a8│·V·E│····│····│ 00000180 b5 69 5a a4 00 00 00 41 00 00 00 13 b5 54 e6 f9 │·iZ·│···A│····│·T··│ 00000190 b4 8f ed 24 b5 69 41 60 b5 60 61 38 b4 8f eb 30 │···$│·iA`│·`a8│···0│ 000001a0 00 00 00 19 b4 8f ed 24 00 00 00 41 b5 54 9f 4b │····│···$│···A│·T·K│ 000001b0 00 00 00 00 b5 69 41 60 b5 60 61 38 00 00 00 64 │····│·iA`│·`a8│···d│ 000001c0 b4 8f eb 48 b5 56 e0 4f b4 8f eb 50 b5 56 ef 31 │···H│·V·O│···P│·V·1│ 000001d0 b5 60 61 38 b5 69 ab 60 b5 60 61 38 b5 69 ab 60 │·`a8│·i·`│·`a8│·i·`│ 000001e0 b4 8f eb 68 b5 56 e0 4f b4 8f eb 70 b5 54 57 fd │···h│·V·O│···p│·TW·│ 000001f0 b5 69 ab 58 b4 8f ed 24 00 00 00 41 b5 69 ab 10 │·i·X│···$│···A│·i··│ 00000200 b4 8f eb 90 00 00 00 0f b4 8f ed 24 b5 56 82 8b │····│····│···$│·V··│ 00000210 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 │····│····│····│····│ 00000220 b5 60 61 38 b5 60 61 38 b3 6e 95 b8 00 00 00 41 │·`a8│·`a8│·n··│···A│ 00000230 b4 8f eb c8 00 00 00 41 b3 6e 95 b8 b5 60 61 38 │····│···A│·n··│·`a8│ 00000240 b3 6e b5 f0 b5 56 79 25 b5 56 78 bd b5 69 41 60 │·n··│·Vy%│·Vx·│·iA`│ 00000250 b5 69 39 64 00 00 00 14 b4 8f eb e0 b5 54 cd db │·i9d│····│····│·T··│ 00000260 b5 56 79 59 b5 69 39 64 b4 8f eb f0 b5 54 c9 f5 │·VyY│·i9d│····│·T··│ 00000270 b5 69 41 60 b5 69 41 60 00 00 00 06 b5 60 61 38 │·iA`│·iA`│····│·`a8│ 00000280 b4 8f ec 18 00 00 00 14 b3 6e f6 60 b5 54 d2 13 │····│····│·n·`│·T··│ 00000290 b5 54 da cd b5 69 41 60 00 00 00 00 b5 69 39 64 │·T··│·iA`│····│·i9d│ 000002a0 b4 8f ec 38 00 00 00 00 00 00 00 00 b5 60 00 00 │···8│····│····│·`··│ 000002b0 b5 60 61 38 b3 6f 16 a0 00 00 00 41 00 00 00 0f │·`a8│·o··│···A│····│ 000002c0 b4 8f ec 68 00 00 00 0f b3 6f 16 a8 b5 60 61 38 │···h│····│·o··│·`a8│ 000002d0 b3 6f 36 d0 b5 54 6e 5d 00 00 00 00 ff ff ff ff │·o6·│·Tn]│····│····│ 000002e0 00 00 00 00 b5 68 13 71 00 00 00 0c b5 69 39 70 │····│·h·q│····│·i9p│ 000002f0 00 00 00 0e b5 5d 62 84 b5 5d 62 c0 b5 5d 62 e0 │····│·]b·│·]b·│·]b·│ 00000300 b5 5d 63 10 b5 5d 63 3c b5 5d 63 68 00 00 00 41 │·]c·│·]c<│·]ch│···A│ 00000310 b3 6c 82 1c 00 00 00 01 00 00 00 00 b3 6c 82 36 │·l··│····│····│·l·6│ 00000320 b4 8f ed 24 00 00 00 41 b3 6c 82 36 00 00 00 00 │···$│···A│·l·6│····│ 00000330 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 │····│····│····│····│ 00000340 00 00 00 00 b5 60 61 38 b5 60 61 38 b5 69 39 70 │····│·`a8│·`a8│·i9p│ 00000350 b5 69 39 64 b5 69 5a a4 b4 8f ec f0 00 00 00 00 │·i9d│·iZ·│····│····│ 00000360 b5 69 5a a4 b4 31 15 07 b5 69 39 70 b5 54 e6 f9 │·iZ·│·1··│·i9p│·T··│ 00000370 b5 69 39 64 00 00 00 02 b5 69 5a a4 b4 8f ed 20 │·i9d│····│·iZ·│··· │ 00000380 b4 31 15 07 00 00 00 0c b4 31 15 07 b5 54 ea 59 │·1··│····│·1··│·T·Y│ 00000390 00 00 00 00 00 00 00 00 00 00 00 00 41 02 6f 10 │····│····│····│A·o·│ 000003a0 b5 5d 88 94 b5 5d 88 5c b4 8f f8 f0 b5 69 f7 20 │·]··│·]·\│····│·i· │ 000003b0 00 00 02 e9 42 2b d0 10 00 00 01 74 00 00 00 00 │····│B+··│···t│····│ 000003c0 b4 8f ed 58 00 00 00 00 b4 8f ed 50 00 00 00 81 │···X│····│···P│····│ 000003d0 42 2b cc 60 b4 8f ed 60 00 00 00 00 00 00 00 00 │B+·`│···`│····│····│ 000003e0 00 00 00 00 b5 69 f7 20 b5 69 f6 d4 00 00 00 00 │····│·i· │·i··│····│ 000003f0 b4 8f ed 78 b5 69 f6 b0 00 00 00 00 00 00 ff ff │···x│·i··│····│····│ 00000400 b4 8f ed 98 b4 8f ed 90 b4 8f f8 f0 0e 0a 24 00 │····│····│····│··$·│ 00000410 b4 8f ed 98 │····││ 00000414 Who knows what to do now with this Code?
  6. So I have been wanting to connect a USB Bluetooth adapter to the NANO so that I can send GPS data to war-drive from my phone. I have been following the instructions outlined here: http://blog.hackedexistence.com/?p=294 When I get to the point of adding the modules to the kernel specifically when I run "insmod ./rfcomm.ko" the Pineapple crashes and reboots. Any help would be much appreciated. Worst case I guess I could hook up a GPS module via FTDI, but I would like the wireless aspect of it.
  7. Ubertooth that more hardware has compared to normal bluetooth cards??
  8. # The Goal: I would like to make a pineapple module that uses a bluetooth radio plugged into the USB port. The goal for version 1.0 is to simply list bluetooth devices in range. I chose the Tetra because of its storage space, I originally tried this on the nano, but because there is only ~2MB of storage, it becomes difficult to install the kernel modules and bluetooth libraries to the SD card, so once I get it working on the Tetra I will figure out how to deploy the same solution to the nano. # The Setup: Wifi Pineapple Tetra running version 1.0.2 of the firmware. I started this with a fresh install of the firmware by performing the ‘firmware recovery’ steps from this page: https://www.wifipineapple.com/pages/faq (except your IP address needs to be 192.168.1.2). # Update the opkg cache: root@Pineapple:~# opkg update # Install kmod-bluetooth Next we need to install the bluetooth kernel module, but the one in the pineapple repos is out of date. running ‘opkg list | grep bluetooth’ shows version 3.18.20-1 while ‘uname -r’ shows 3.18.23. If you run ‘opkg install kmod-bluetooth’ you will get an error that complains about kernel version mismatch, ending with the following: If the above errors were only about a kernel version missmatch, please ignore them. The package was installed successfully. Which is true, the new module is installed in /lib/modules/3.18.20/ while all of the other kernel modules are installed in /lib/modules/3.18.23. Instead, lets just get the newer version of the bluetooth kernel module straight from the openwrt repo (which can be found here) : root@Pineapple:~# wget https://downloads.openwrt.org/latest/ar71xx/generic/packa ges/base/kmod-bluetooth_3.18.23-1_ar71xx.ipk Now well install the ipk we just downloaded: root@Pineapple:~# opkg install ./kmod-bluetooth_3.18.23-1_ar71xx.ipk This command still complains about a kernel mismatch, so well tell opkg to ignore dependencies: root@Pineapple:~# opkg –nodeps install ./kmod-bluetooth_3.18.23-1_ar71xx.ipk # Install the bluez libraries and utilities This package will give us commands like hciconfig and hcitool root@Pineapple:~# opkg install bluez-libs root@Pineapple:~# opkg install bluez-utils At this point we should have the ‘hciconfig’ and ‘hcitool’ commands available to us, but they will error out: root@Pineapple:~# hciconfig -a Can’t open HCI socket.: Address family not supported by protocol root@Pineapple:~# hcitool dev Devices: root@Pineapple:~# # Insert the kernel modules root@Pineapple:~# cd /lib/modules/3.18.23/ root@Pineapple:/lib/modules/3.18.23# insmod ./bluetooth.ko root@Pineapple:/lib/modules/3.18.23# insmod ./btusb.ko root@Pineapple:/lib/modules/3.18.23# insmod ./rfcomm.ko # Plugging in the Bluetooth USB dongle This part sucks. For some reason, even when using the 12 volt 2 amp power supply that the tetra came with, when I plug in a bluetooth dongle, the device resets. All the interfaces go down, my computer drops from the pineapples wireless network, and the pineapple reinitializes all of its interfaces. If you watch the available networks, you will even see the ‘Pineapple_XXYY’ unencrypted network get thrown up then immediately taken back down before the management network comes back up. The problem with this is now the kernel has been reloaded, so all of the modules we just loaded are no longer loaded. After the pineapple is done rebooting, reconnect to it. # Make sure we can see the USB dongle root@Pineapple:~# lsusb Bus 001 Device 002: ID 0a12:0001 Cambridge Silicon Radio, Ltd Bluetooth Dongle (HCI mode) Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub # Reload the kernel modules root@Pineapple:~# cd /lib/modules/3.18.23/ root@Pineapple:/lib/modules/3.18.23# insmod ./bluetooth.ko root@Pineapple:/lib/modules/3.18.23# insmod ./btusb.ko root@Pineapple:/lib/modules/3.18.23# insmod ./rfcomm.ko # Check out the hci0 interface root@Pineapple:/lib/modules/3.18.23# hciconfig -a hci0: Type: BR/EDR Bus: USB BD Address: 00:00:00:00:00:00 ACL MTU: 0:0 SCO MTU: 0:0 DOWN RX bytes:0 acl:0 sco:0 events:0 errors:0 TX bytes:0 acl:0 sco:0 commands:1 errors:0 Features: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 Packet type: DM1 DH1 HV1 Link policy: Link mode: SLAVE ACCEPT # Bring the interface up Now we can see the interface, but when we try to bring it up, the pineapple can’t initialize the interface. root@Pineapple:/lib/modules/3.18.23# hciconfig hci0 up Can’t init device hci0: Connection timed out (145) # Next Step This is as far as I have gotten. Next I’ll work on figuring out why the interface cant initialize, and then I should be able to build an infusion that will bring bluetooth to the pineapple. Stay tuned.
  9. I plan on using a Raspberry Pi 2 running Raspian. I want to wardrive wifi and bluetooth at the same time also while using gpsd of course for a rough location on one Raspberry Pi. I will be using an Alfa w/ external antenna and an Ubertooth w/ external antenna. Now for some questions... 1. Will I need to run (2) instances of Kismet, or can it be done is (1) instance, keeping in mind the Ubertooth needs to run a plug-in? 2. If I need to run (2) instances of Kismet, will I need to use (2) separate config files, and/or two installations of Kismet in differing locations? 3. I'm assuming gpsd can feed GPS coordinates to both the wifi and bluetooth scanning? 4. Offer any insight to some problems you think I might run into, or recommandations on the best way to accomplish this, or even perhaps a better way? Any feedback would be much appreciated..Thanks
  10. So i was wondering if anyone has tried this or knows how to? -------------------------------- PS4 Bluetooth Pass Through a Computer for the PS4 Controller for Custom 'Configs & Auto Commands' to send back to the PS4 System and looks as if it was the normal controller connected not the PC Bluetooth or, if plugged in the controller Bluetooth output to the PS4. PS: Sorry if this doesn't make sense to you, if you have questions on what i posted please reply and I'll answer the best i can. Thanks Also those who know me sorry i haven't been on in a long time.. Still using all my products $300+ best money spent on online products.. "Sneaky Sneaky" Note: I'm not a Cheater, simply don't have time to Farm XP Points because of work, ETC.
  11. Hey Guy's I need your help, I have a Toshiba Satellite laptop with built-in bluetooth and and installation of Kali Linux 1.1.0. My problem is that i cannot get my internal bluetooth to work and i have even lost the bluetooth icon on the indicator panel. My outputs are : lsusb Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 004: ID 0930:0227 Toshiba Corp. Bus 001 Device 003: ID 1a40:0101 Terminus Technology Inc. 4-Port HUB Bus 001 Device 002: ID 04f2:b446 Chicony Electronics Co., Ltd Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub lspci 00:00.0 Host bridge: Intel Corporation ValleyView SSA-CUnit (rev 0e) 00:02.0 VGA compatible controller: Intel Corporation ValleyView Gen7 (rev 0e) 00:13.0 SATA controller: Intel Corporation ValleyView 6-Port SATA AHCI Controller (rev 0e) 00:14.0 USB controller: Intel Corporation ValleyView USB xHCI Host Controller (rev 0e) 00:1a.0 Encryption controller: Intel Corporation ValleyView SEC (rev 0e) 00:1b.0 Audio device: Intel Corporation ValleyView High Definition Audio Controller (rev 0e) 00:1c.0 PCI bridge: Intel Corporation ValleyView PCI Express Root Port (rev 0e) 00:1c.1 PCI bridge: Intel Corporation ValleyView PCI Express Root Port (rev 0e) 00:1c.2 PCI bridge: Intel Corporation ValleyView PCI Express Root Port (rev 0e) 00:1f.0 ISA bridge: Intel Corporation ValleyView Power Control Unit (rev 0e) 00:1f.3 SMBus: Intel Corporation ValleyView SMBus Controller (rev 0e) 01:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd. RTL8101E/RTL8102E PCI Express Fast Ethernet controller (rev 07) 02:00.0 Network controller: Atheros Communications Inc. AR9565 Wireless Network Adapter (rev 01) 03:00.0 Unassigned class [ff00]: Realtek Semiconductor Co., Ltd. RTS5229 PCI Express Card Reader (rev 01) dmesg | grep Blue [ 6.193086] toshiba_bluetooth: Detected Toshiba ACPI Bluetooth device - installing RFKill handler [ 6.193497] toshiba_bluetooth: Re-enabling Toshiba Bluetooth [ 6.972220] Bluetooth: Core ver 2.19 [ 6.972333] Bluetooth: HCI device and connection manager initialized [ 6.973447] Bluetooth: HCI socket layer initialized [ 6.973469] Bluetooth: L2CAP socket layer initialized [ 6.973546] Bluetooth: SCO socket layer initialized [ 7.126003] Bluetooth: Loading patch file failed [ 19.876412] Bluetooth: RFCOMM TTY layer initialized [ 19.876434] Bluetooth: RFCOMM socket layer initialized [ 19.876450] Bluetooth: RFCOMM ver 1.11 [ 19.959383] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [ 19.959391] Bluetooth: BNEP filters: protocol multicast [ 19.959407] Bluetooth: BNEP socket layer initialized [ 264.813159] toshiba_bluetooth: Re-enabling Toshiba Bluetooth As you can see [7.126003] Bluetooth: Loading patch file failed - and i have no idea on how to fix this. I have been scrolling google for days and still nothing works. Please help.
  12. I have an idea for a tv-b-gone type device but I know nothing on circuits so I could use some help. I want to make a infrared repeater (Code name: The Black Mime). What I want the device to do is have a infrared sensor and save the infrared code onto a attiny85. If the switch for the sensor is off and a button is pressed then I want the infrared transmitter to send the last saved code. If the sensor is turned on after another code is saved then the attiny will reset itself and have no data on it then save the code received. That's basically what I want for this project. If this one gets built and posted then I will keep thinking of projects. Thanks, hypersonic5000
  13. I was wanting to get into looking at Bluetooth penetration testing, but I couldn't figure out how to bridge the Bluetooth adapter through Virtual Box into the OS; it keeps saying no Bluetooth device found. Anyone know how?
  14. Hey fiends Up for sale is a Ubertooth... the current model! It was purchased late October 2012, and I have only used it once. In as-new condition. (photo of actual item I am selling included) The item is in Australia but I can send it anywhere if I get the right price. Paid US$119.95 from Hak Shop BEST OFFER WILL WIN IT! Email David (me) @ dmoebius@mail.ru for details/offers [edit] will ship with full tracking **UPDATE** Item has been sold.
  15. Hi All, ages since i posted, I have an idea running through my head and can only assume that because i'm not cutting edge someone has been here before me. I have been burgled (well attempted) and have since installed an IR sensor and alarm to my property but thought about something alittle extra. Bluetooth logging, most people have smart phones these days, criminals included, well if fingerprinting and foot prints are enough to send crimbo's to the slammer then bluetooth mac addresses have to be closley followed right ? I mean most bluetooth devices have the owners name on them like bob or jim (no offence to law abiding bob's & jims ) but this gives you a name of who was snooping nearby and the unique ID of there phone. I know i could get something like thepineapple to capture wifi and maybe assiocate to an accesspoint but think bluetooth is of a lesser range and as a result wouldn't give so many false positives. ideally based on low power consumption as it will be 12 volts powered.
  16. Hey guy's so recently I was working on an APP that used GPS to locate the positions Latitude & Longitude of a device. Now that all fine and dandy when you're outdoors but as soon as you go indoors its a whole different ball game, because the device does not have clear line of sight to the satellites it cannot accurately (within a reasonable margin of error 1-2 meters) get the correct position of the device. So GPS was out the windows and I started looking at other solutions and figured where better to ask these questions than hak5. So far what i have learned is that in doors the position of a device can be accurately calculated using WiFi. Now I know to some of you boffins out there this will be nothing knew but this is new mind blowing territory for me and I am having a hard time wrapping my head around just how it works and was wondering if you guys could shed some noob friendly light on the whole subject of WiFi positioning and how it works. From what I have read and understood so far you take a number of WiFi routers position them throughout a building and by doing this you can accurately locate the position of the device in the building based on WiFi signal strength of the routers? < thats the bit i don't get / am getting mixed of with. Basically I need a cheap solution for wifi positioning. There are guys out there that all ready have bespoke products avalable but i am sure they are crazy expensive like these guys over at Navizon http://www.youtube.com/watch?v=Sw7gc8ic5vM Also I found this video intresting, istead of wifi these guys mention using bluetooth as a means of positioning instead of wifi http://www.youtube.com/watch?v=n0UbrkJpypc I hope we can all discuss this subject further as I really need to implement a solution like this and i just find it pretty dam interesting in general. Also as a side note I think i may have accidently have stumbled accross why google street view cars collected all that wifi info they were not suppose to be collecting. WIFI POSITIONING!!! http://en.wikipedia.org/wiki/Wi-Fi_positioning_system just a hunch but you never know! and if that wasn't enough take a listen to this guy and play close attention when he talks about drivers! http://www.youtube.com/watch?v=Skifba2SMpE
  17. Whats the best way to lock up a system when a wirless device belonging to the owner is 21" from the keyboard? I had to run outside and help my frantic neighbor extinguish a bush fire his kid started by throwing a bottle rocket into a pile of dry leaves yesterday. As I was hosing it down it occurred to me I left my outlook open. I'm looking for a ubiquitous, OS agnostic, device or secure protocol such as bluetooth that will lock up the system in the event of an emergency. The incident reminded me of a famous story I read....
  18. First of all I'm working with a backtrack 5 VM through parallels. Been working on this for 14 hours straight, so I'm desperate. I built my own ubertooth, checks out fine. flashed the bootloader onto it just fine too. Now i'm working on flashing the bluetooth_rxtx.bin file onto it using ubertooth_dfu but I keep getting the following error: No module named core Traceback (most recent call last): File "ubertooth-dfu", line 318, in <module> print dfu.get_status( ) NameError: name 'dfu' is not defined. [/CODE] The command I use: [CODE] python ubertooth-dfu write bluetooth_rxtx.dfu [/CODE] bluetooth_rxtx.dfu is in the same folder as ubertooth-dfu. I've also tried flashing .bin, .hex, and all the rest of the stuff I can find. I have the device in DFU mode with the only method I can, bridging pins 1 and 3 with a paper clip. Seems to work just fine as everything lights up to show DFU mode. If anyone has the SLIGHTEST idea how I might could fix this, I'd be ever so thankful. And to the person who helps most/gives me a fix is of course the $20 bounty, if allowed on the forums. I've tried everything i can on both mac and backtrack 5 linux, seems like I've got everything but one small detail. Thanks in advance for any and all replies! -alphax
×
×
  • Create New...