Description: Information gathering is the first step in the quest to break into target system. Even BlueTooth devices can be fingerprinted or probed for information gathering using the technique known as BluePrinting. Using this one can determine manufacturer, model, version, etc. for target bluetooth enabled device.
This is part 2 on how to get started with Bluetooth hacking using BackTrack. Learn how to your hcid.conf file, blueprint,bluesmash and lots more!
http://www.insecure.in/bluetooth_hacking.asp
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
what is this hcid.conf ?
thanx
video cut out early... did not show anything all too interesting :(
* video needs static noise removed pretty badly!!!