Back to BlogsKali Linux

Kali Linux Bluetooth Hacking — Exploit Nearby Devices

Anuj Singh (Admin) 31 March 2026 662 views

Bluetooth Hacking with Kali Linux

Bluetooth is enabled on billions of devices — phones, headphones, smartwatches, cars, medical devices. Most have serious vulnerabilities.

Bluetooth Scanning

sudo apt install bluez -y
hciconfig                       # Check Bluetooth adapter
hcitool scan                    # Discover nearby devices
hcitool inq                     # Detailed inquiry scan
sdptool browse XX:XX:XX:XX:XX:XX  # List device services

BlueBorne Vulnerability

BlueBorne (CVE-2017-0781) affected 5.3 BILLION devices. It allows remote code execution over Bluetooth without pairing!

  • No user interaction needed
  • No pairing required
  • Works on Android, iOS, Windows, Linux
  • Wormable — spreads device to device

Bluetooth Attack Types

  • Bluejacking: Send unsolicited messages
  • Bluesnarfing: Steal data (contacts, SMS, photos)
  • Bluebugging: Take control of the device
  • KNOB Attack: Weaken encryption to 1 byte
  • BIAS Attack: Impersonate previously paired devices

Protection

  • 🔒 Turn off Bluetooth when not in use
  • 🔒 Set Bluetooth to "non-discoverable"
  • 🔒 Only pair in private locations
  • 🔒 Keep firmware updated
  • 🔒 Remove old paired devices

🔥 Learn wireless hacking at ONLY4YOU →

Want to Learn This Practically?

Subscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!