Penetration Testing mailing list archives

btscanner 2.0 released


From: bluetooth () pentest co uk
Date: Tue, 13 Sep 2005 12:49:00 +0100

Pentest Limited are pleased to announce the release of btscanner v2.0.

btscanner 2.0 contains many new features over the original, including
inquiry and brute force based scans and a completely redesigned interface.
Furthermore, btscanner is threaded to allow the use of multiple Bluetooth
dongles for scanning.

Description
-----------
btscanner is a tool designed specifically to extract as much
information as possible from a Bluetooth device without the requirement
to pair.

A detailed information screen extracts HCI and SDP information, and
maintains an open connection to monitor the RSSI and link quality.

btscanner is based on the BlueZ Bluetooth stack, which is included with
recent Linux kernels, and the BlueZ toolset. btscanner also contains
a complete listing of the IEEE OUI numbers and class lookup tables.
Using the information gathered from these sources it is possible to make
educated guesses as to the host device type.

Features
--------
- Bluetooth Device Discovery
- HCI and SDP interrogation
- IEEE OUI database lookup

Download URL
------------
btscanner is available from:

http://www.pentest.co.uk/cgi-bin/viewcat.cgi?cat=downloads

MD5 1cb558f02bb6707fa1c160b78b490404  btscanner-2.0.tar.bz2


------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: