redfang包装说明
RedFang是概念验证的一个小应用程序,以发现不发现的蓝牙设备。这是通过暴力破解完成强制设备的蓝牙地址的最后六(6)个字节,并做了read_remote_name()。
- 作者:@stake公司,奥利白宫,西蒙Halsall,斯蒂芬·卡普
- 许可:GPL第二版
0x01 包含在redfang软件包工具
芳 - 蓝牙猎人:~# fang -h redfang - the bluetooth hunter ver 2.5 (c)2003 @stake Inc author: Ollie Whitehouse < > enhanced: threads by Simon Halsall < > enhanced: device info discovery by Stephen Kapp < > usage: fang [options] options: -r range i.e. 00803789EE76-00803789EEff -o filename Output Scan to Text Logfile An address can also be manf+nnnnnn, where manf is listed with the -l option and nnnnnn is the tail of the address. All addresses must be 12 characters long -t timeout The connect timeout, this is 10000 by default Which is quick and yields results, increase for reliability -n num The number of dongles -d Show debug information -s Perform Bluetooth Discovery -l Show device manufacturer codes -h Display help The devices are assumed to be hci0 to hci(n) where (n) is the number of threads -1, this is currently not configurable but maybe at a later date
0x02 redfang用法示例
扫描给定的范围 (-r 00803789EE76-00803789EEff),并发现 蓝牙设备 (-s):
:~# fang -r 00803789EE76-00803789EEff -s
redfang - the bluetooth hunter ver 2.5
(c)2003 @stake Inc
author: Ollie Whitehouse <
>
enhanced: threads by Simon Halsall <
>
enhanced: device info discovery by Stephen Kapp <
>
Scanning 138 address(es)
Address range 00:80:37:89:ee:76 -> 00:80:37:89:ee:ff
Performing Bluetooth Discovery...
原文来自https://www.hackfun.org/kali-tools/redfang_zh.html。转载请注明原出处,商用请联系原作者授权。