Skip to content

scan for bluetooth devices in a hacky way and open an insecure websocket

License

Notifications You must be signed in to change notification settings

redd-rl/bluetooth-scan

Repository files navigation

BluetoothScan

Scans nearby area for Bluetooth devices and displays them for clients, clients are able to connect via a WebSocket (port 8765). Note this is horrendously insecure and should NEVER be used in a production environment. From the vulnerabilities created by Pickle to the potential Man in the Middle attacks and non authenticated non encrypted websockets. Also attempts to detect duplicate devices using the same bluetooth mac addresses. Red represents a potential duplicate. Yellow represents unknown information Green is known safe.

Set-up

Client

git clone https://github.com/redd-rl/bluetooth-scan.git

cd bluetooth-scan

python -m pip install -r requirements.txt

Then run the corresponding file for your OS, out of run_windows.bat, run-mac.sh and run_linux.sh

Server

Prior knowledge here is assumed but the process is similar. git clone https://github.com/redd-rl/bluetooth-scan.git

cd bluetooth-scan

python -m pip install -r requirements.txt

How to run

Client

python client.py

Server

python monitor.py

Footnote

If bluetooth_ids.json isn't present ALL manufacturers will show up as their CIC ids, as reported from the bluetooth device.