Use LINUX to HACK mobile having Blue-Tooth??????
I was thinking to post this topic for a long time...but couldn post it coz I do not know much use of Linux..Hence consulted my friend before posting..To get complete idea,do go through the screenshots provided...
The following screenshot explain how you could use a Linux fedora core 3 running the program "bluetest.pl"
to hack via Bluetooth into Nokia 6600 (Other version will also work but require minor program modification.
1. Start the Bluetooth Hardware from your Laptop (ie. - FN + F5 for IBM laptop)
2. Start the service for Bluetooth on your Fedora Server (See SS).
Screenshot here: http://www.4shared.com/file/19165997/3b7d046a/1_online.html
3. Load the Bluetooth Module (Required for Bluz)
Screenshot here: http://www.4shared.com/file/19165960/22818d06/2_online.html
4. Bind the Bluetooth Device to the Computer rfcomm0 port (make sure the port is being created if it's missing)
SS here: http://www.4shared.com/file/19165985/cc685407/3_online.html
5. Modify Parameter in the Program "bluetest.pl" and run the program.
SS here: http://www.4shared.com/file/19166038/4c496510/4_online.html
6. Bluetest.pl should find the Mobile Devices (Phone, etc) which has Bluetooth enabled.
SS here: http://www.4shared.com/file/19166014/77c94bb9/5_online.html
7. Connect to the device Found (in a binding Manner) and start extracting information from device (phone must accept).
SS here: http://www.4shared.com/file/19166078/2825a014/6_online.html
8. Reading and Sending SMS (The messages must still need to be converted to appropriate character)
SS here: http://www.4shared.com/file/19166162/d029127c/7_online.html
9. 9. Extract Last 5 dial, missed and received calls. (This require more program hacking to be successful)
SS here: http://www.4shared.com/file/19166110/7166e597/8_online.html
10. Adding entries into the Phone book and reading the first 5 entries in the phone book (require more program hacking).
SS here: http://www.4shared.com/file/19166095/c817f127/9_online.html
11. Making a call from the mobile (can be useful for spying on someone).
SS here: http://www.4shared.com/file/19166062/d1eb784b/10_online.html
12. Program Terminated (THE END)
SS here: http://www.4shared.com/file/19166135/333a739a/11_online.html
You are now done.....This method can be successfully applied on other handsets also( Yes,my friend showed me demo on N 90 also)......I hope all the screenshots are clear to u....
No comments:
Post a Comment