NetHunter Hacker XI: Bluetooth arsenal

NetHunter Hacker XI: Bluetooth arsenal


Bluetooth technology has become an integral part of our daily lives, from connecting our smartphones to our cars and headphones to sharing files between devices. However, as with any wireless technology, Bluetooth is vulnerable to hacking attempts. In this blog post, we will discuss the various methods hackers use to exploit Bluetooth technology and the steps you can take to protect yourself and stay safe. So, whether you’re a casual user or a mobile hacker, this post will provide you with the knowledge and tools you need to stay safe and secure in the world of Bluetooth.

Bluetooth Arsenal

This is a collection of tools that allows you to perform various tests using Bluetooth such as recon, spoof, listen to or inject audio to devices. So far, it was necessary to have external and kernel supported Bluetooth dongle connected to device using OTG adapter. However, currently lates Kali NetHunter version 2022.4 supports some internal Bluetooth chips as well.

When you are using Bluetooth Arsenal for the first time, you have to Setup and then Update it first. These options are in top right corner, if you tap on three dots.

If you have an external adapter, plugin it to your Android using OTG adapter. If it is supported, it should appear in Bluetooth interface as hci0.

If you can’t see it there, then you must enable it manually. This method worked for one of my dongles that were supported, but not enabled by NetHunter.

Open NetHunter Terminal app, and type hciconfig command to get information about hci devices. If it appears, try to enable it using hciconfig hci0 up as you can see in Figure 1. If you restart NetHunter app, newly started Bluetooth interface should be there.

Figure 1. Manually enable Bluetooth adapter

For internal Bluetooth, you first need to start all the services such as Bluebinder, Dbus Service, Bluetooth Service and Interface for an adapter to appear. Once you select it in interface, you can SCAN FOR DEVICES. The arsenal can scan only for Bluetooth not Bluetooth Low Energy (BLE) devices, which means your gadgets and IoT’s will not be discovered. You can see scan result in Figure 2.

Figure 2. Scan for Bluetooth devices using internal adapter

From the scan results, you can select a targeted device, and move to Tools tab.


In Tools tab you must either manually enter targeted device MAC address or tap on USE SELECTED TARGET from previous tab. Here you can setup and run tools such as L2ping, Redfang, Blueranger and SDP Tool.


This is a ping flood tool that can start Denial-of-Service (DoS) attack. It will generate packet with custom size and count to be send to a targeted device. As a result, device will be flooded and might crash.

Figure 3. Bluetooth Arsenal Tools

RFCOMM SCAN tries to search for open RFCOMM channels by scanning certain range. Altogether the are 30 channels. RFCOMM scanning is like a port scanner but for Bluetooth. It is making a complete connection to each channel. The owner of the targeted device is prompted to allow it and may even be required to enter a password if it reaches a channel that requires additional authentication. The socket connection is terminated if the owner decides not to approve the connection.

During my test, I was able to partially use the rfcomm_scan tool, but only if targeted device was scanning for Bluetooth devices. Then my targeted device received a pairing and permission request.

Targeted device is already selected by the attacker by tapping on the USE SELECTED TARGET button. When we run the attack by launching RFCOMM SCAN button, new device – be default called BlueZ 5.66 – appears as newly discovered device. By the way, if you would like to change the name of the spoofed device can be modified in Spoof tab. When targeted device tries to pair with it, rfcomm starts to scan, see Figure 4.

Figure 4. Newly discovered spoofed device

In some cases, it might even request to access messages or other permissions, see Figure 5.

Figure 5. Attacker device requests access to messages

It seems very dangerous, but in all my test cases I wasn’t able to actually exploit this vulnerability. Most of the time – during the attack – Android crashed.

Mobile hacker would allow the NetHunter to connect to a Bluetooth device, simultaneously as the user. As a result, it might either crash the target or you take control of it.


Bluetooth devices have two modes: visible and not visible. Redfang tool focuses on non-visible devices using bruteforce method. It tries to connect to the range of user defined MAC addresses to obtain detailed device information. This information is then stored in redfang.log file.

To launch a Bluetooth recon, you must set the range of MAC addresses to scan and file path to a log output of the scan, default is /root/redfang.log. When you start to HUNT FOR DEVICES, redfang will try to bruteforce each MAC address in the range to discover non-visible Bluetooth devices as you can see in Figure 6.

Figure 6. Setup Range of MAC addresses before starting to hunt
Figure 7. Scan successfully found my testing device

During my tests, when it discovered a devices, it displayed its information and crashed, so it wouldn’t continue in further bruteforce scan.


BlueRanger script tries to locate the distance of targeted Bluetooth device. This is done by sending l2cap pings, as we saw in previous tool, to identify a link quality. If the quality is higher, device is closer.

By taping on CHECK PROXIMITY button, you will start the device range analysis as you can see in Figure 8.

Figure 8. Output of proximity check for our targeted devices

SDP Tool

Functionality of SDP tool is to perform Service Discovery on targeted device. It will enumerate all running services to find open one. The result of the scan is displayed under the DISCOVER SERVICES button, as demonstrated on Figure 9.

Figure 9. Result of service discovery scan

From Tools tab, continue with Spoof.


For spoofing Bluetooth device, NetHunter uses tool called Spooftooph. Its goal is to clone or spoof device name, class and MAC address. Result of spoofing should, allows Bluetooth device to hide in plain site, whatever that means. If you spoof or clone a Bluetooth device, you can’t interact with it such as receive connection, pair with a device, or trigger any type of phishing.

From settings, you need to select Bluetooth interface. In my case, internal hci0 wasn’t supported so I used external adapter that is identified as hci1. Set the target to spoof or clone by USE SELECTED TARGET, that we set from Main Page or type the MAC address, class and name manually. Start spoofing using APPLY button. CHECK button will summarize the spoof settings, as you can see in Figure 10.

Figure 10. Spoofing my testing Mobile Hacker device
Figure 11.Bluetooth spoofing started

Unfortunately, I couldn’t successfully spoof any of my devices. The tool didn’t crash, rather closed after few seconds without any error.


This tool is a proof-of-concept from 2005, that allows to either listen audio from headset’s microphone or inject custom sound into car speaker, headset, speakers etc. This is possible because these devices use common security pairing code such as “0000” or “1234”. It connects to a device and opens a control connection. The carwhisperer begins transmitting sounds to the headset and recording audio from it as soon as a connection has been made. It allows you to now inject audio data into the targeted devices.

Figure 12. Carwhisperer options

Bluetooth Wardriving

Bluetooth wardriving is the practice of searching for and identifying Bluetooth-enabled devices in a specific area using a mobile device or computer. This can be done with the use of specialized software and hardware, such as a Bluetooth scanner or sniffer. The goal of Bluetooth wardriving is often to identify vulnerable devices that can be exploited or to gather information about the devices and their locations. Bluetooth wardriving using can be done on non-rooted Android device using for example WiGLE WiFi Wardriving app. Using NetHunter, you can wardrive to scan for Bluetooth devices using Kismet. How to setup Kismet for Wi-fi and Bluetooth I already explained in my nethunter wirless hackngn toosl post.

Figure 13. Bluetooth wardriving  setup

Preventing attacks

Here are a few tips to help prevent and stay safe from Bluetooth attacks:

  1. Keep your devices operating system updated: Regularly check for and install software updates for your devices to protect against known vulnerabilities.
  2. Use pairing passwords: Make sure to use pairing passwords when connecting to other devices via Bluetooth, to protect against unauthorized access.
  3. Disable Bluetooth when not in use: To reduce the risk of an attack, it’s best to disable Bluetooth when you’re not using it.
  4. Be cautious with public Bluetooth devices: Be wary of connecting to public Bluetooth devices, such as beacons, as they may not be secure. Avoid entering sensitive information while connected to a public Bluetooth device.


Bluetooth technology has become a ubiquitous part of our daily lives, but it also poses a security risk if not properly protected. Hackers can exploit vulnerabilities in Bluetooth to gain unauthorized access to devices, steal personal information, stalk users via broadcasted MAC address, and inject input. It’s important to be aware of the risks and take steps to protect yourself.

10 thoughts on “NetHunter Hacker XI: Bluetooth arsenal

  1. Michał

    Hello, i have a problem with bluetooth arsenal in my oneplus 7 pro. if i write comment ” bluebinder in terminal i so ” bluetooth binder service failed. what’s is wrong?

    1. There was a bug in the NetHunter app that might be responsible for this error. I advise to update NetHunter app from NetHunter store. I hope this will fix the issue.

  2. Ismail

    I have same problem of Michel .. bluebinder service failed .. although the kernel support internal Bluetooth (Poco x3 nfc )

    1. Are you running the latest NetHunter version of the app? If not, then update and the issue should disappear.

      1. Michał

        I now have a problem that I can’t run bluebinder every time. Can you run this function every time? And yes I have fully update and upgrade for latest nethunter. My phone is oneplus 7 pro and Android 10.

        1. I had that problem in previous version of nethunter, but not now. Bluebinder after flashing kernel and updating the NH app runs smoothly on both of mine oneplus7 pro and oneplus7t pro.

  3. Michał

    Ok thanks I do this!!

  4. Michal

    Hello, i reflash the Kernel but my bluetooth Arsenal not working. How i can fix this ?

    1. srerg

      iam also having this problem i cant find any solutions online

      1. Michal

        Mh, maybe make some instructions to make it work all the time. My oneplus 7 pro still won’t turn on bluebinder. I keep getting the “bluetooth binder service failed” error. When I enter hciconfig I get Hci0 type: primary bus: Virtual. And in your description I see it as a bus: USB. Can you help??:(

Leave a Reply

Your email address will not be published. Required fields are marked *