Phone Unlocking Mobile Phone Hacking????

can some one please pm the link or even just the name of the software so i can have a look for it,
 
Try this

BlueSniffer, BlueSnarfer and Redfang, Blooooover.

_http://trifinite.org/trifinite_downloads.html#toools
 
There you are now just a matter of testing and seeing which one actually works.
 
bally12345, my contribution was to point out that the software could be used illegally and to point to a list where people could check to see if there phone could be hacked using this software.
Correct me if I'm wrong but I thought the whole idea of this forum was to help each other and to share information, now I know I did not pass on the information that you wanted but I thought I would pass on the information of the security flaw in bluetooth phones to members who may be viewing this thread but are unaware that their phone may be hacked.

It would seem you have now found the software anyway.
 
Hi peeps i have read through the thread and find it very intresting. Iv downloaded the software and tryed to put it on my nokia 6230i with nokia fone manger but it wont allow me to install it is this because it is nokia phone manger? will i have to use another phone manger to install it?
 
Have a look for MobiMB m8 , i ues it for the my nokia 6230i with no probs

Cheer Garry
 
Hi garrytate thanks for the help would you be able to tell me where i can download mobiMB
 
leeroybrown said:
Hi garrytate thanks for the help would you be able to tell me where i can download mobiMB

Try torrent sites
 
is every 1 ere talking about blooover 2,

cos if they are i cant see what all the fuss is about cos its a rubbish program,

if there is other software better than blooover plz tell me cos id love to try it!

cheers...c
 
We are talking about what ever works the best... The main reason I want it is so I can browse a few peoples phone and see what they hiding... All for fun though... Not to cause distress to the other person etc.
 
cut the bull anyone got the software?
 
is this what your all looking for?

/http://www.getjar.com/products/3950/Blooover2
 
i tried this software it dont work

ok UPDATE

so far i have tried the following software on my 6230 and none of them work

Bloover
Bloover 2
BlueJacX
BTexplorer
Mobiluck
Openbex-1.3
Easy Jack
BTbrowser
Bluediving
Bluesnarfer

none of these browse other ppls phones

can anyone help plz
 
Last edited:
omfg, nice link. nice software for my d500.. :Cheers:
 
ill get to the bottom of it looks like no fecker has the software ill try and find it will have to contact some old timers
 
JIMMYQ said:
ill get to the bottom of it looks like no fecker has the software ill try and find it will have to contact some old timers

Top man :)
 
Bluetooth's vulnerability comes down to a few key points:

* Early, faulty Bluetooth implementations, since corrected.
* Users choosing short PINs that are easy to crack with brute-force computing. (Not able to do via java that the phone sw runs on)
* Users unwisely pairing Bluetooth devices in public places.
* Motivated, dedicated privacy snoops willing and able to use special, and sometime expensive, hardware and software. (Linux)

Basicly yes yo can bluesnarf phones with other phones but you will probably find it is a SE T68i or another early bluetooth phone that hasnt had the flaws fixed..

Basicly grab a copy of Knoppix Avalible here and give it a bash other sw is needed.

or grab this sw http://www.remote-exploit.org/index.php/Auditor_main that is based on Knoppix with lots of extras ;)


Footprinting

* Greenwhich
* Whois
* Gnetutil (Network Utilities)
* Itrace (ICMP traceroute)
* Tctrace (TCP traceroute)
* Traceroute
* DNSwalk (DNS verification)
* Dig (DNS lookup)
* Host (DNS lookup)
* NSTXCD (IP over DNS client)
* NSTXD (IP over DNS server)
* Oxyman (DNS tunnel)
* Curl (URL transfer)
* Elinks (Console web browser)
* Konqueror (Web browser)
* Socat (Socket Cat)
* Stunnel (Universal SSL tunnel)
* Arpfetch (SNMP ARP/IP fetcher)
* SNMPWalk (SNMP tree walk)
* TKMib (Mib browser)
* GQ (LDAP browser)
* Komba2 (KDE SMB browser)
* LinNeighborhood (Graphical SMB browser)
* Net utils (NET utilities)
* SMBClient (SMB client)
* SMBGet (SMB downloader)
* Smb4K (SMB share browser)
* Xsmbrowser (Graphical SMB browser)
* nmblookup (Netbios name lookup)
* smbdumpusers (User browser)
* smbgetserverinfo (Get server info)
* Cheops (Network neighborhood)
* NTP-fingerprint (Detection based on ntp fingerprint)
* Nmap (Network scanner)
* NmapFE (Graphical network scanner)
* P0f (Passive OS fingerprinting)
* Queso (OS detection)
* XProbe2 (OS detection)


[edit]
Scanning

* Cisco global exploiter (Cisco scanner)
* Cisco torch (Cisco oriented scanner)
* ExploitTree search (ExploitTree collection)
* Metasploit (Metasploit commandline)
* Metasploit (Metasploit console GUI)
* Metasploit (Metasploit web interface)
* Nessus (Security Scanner)
* Raccess (Remote scanner)
* Httprint (Webserver fingerprinting)
* Nikto (Webserer scanner)
* Stunnel (Universal SSL tunnel)
* Cheops (Network neighborhood)
* GTK-Knocker (Simple GUI portscanner)
* IKE-Scan (IKE scanner)
* Knocker (Simple portscanner)
* Netenum (Pingsweep)
* Netmask (Requests netmask)
* Nmap (Network scanner)
* NmapFE (Graphical network scanner)
* Proxychains (Proxifier)
* Scanrand (Stateless scanner)
* Timestamp (Requests timestamp)
* Unicornscan (Fast port scanner)
* Isrscan (Source routed packets scanner)
* Amap (Application identification)
* Bed.pl (Application fuzzer)
* SNMP-Fuzzer (SNMP protocol fuzzer)
* ScanSSH (SSH identification)
* Nbtscan (Netbios scanner)
* SMB-Nat (SMB access scanner)
* Ozyman (DNS tunnel)
* Ass (Autonomous system scanner)
* Protos (Protocol identification)


[edit]
Analyzer

* AIM-SNIFF (AIM sniffer)
* Driftnet (Image sniffer)
* Mailsnarf (Mail sniffer)
* Paros (HTTP interception proxy)
* URLsnarf (URL sniffer)
* smbspy (SMB sniffer)
* Etherape (Network monitor)
* Ethereal (Network analyzer)
* Ettercap (Sniffer/Interceptor/Logger)
* Hunt (Sniffer/Interceptor)
* IPTraf (Traffic monitor)
* NGrep (Network grep)
* NetSed (Network edit)
* SSLDump (SSLv3/TLS analyzer)
* Sniffit (Sniffer)
* TcPick (Packet stream editor)
* Dsniff (Password sniffer)

[edit]
Spoofing

* Arpspoof (ARP spoofer)
* Macof (ARP spoofer/generator)
* Nemesis-ARP (ARP packet generator)
* Nemesis-Ethernet (Ethernet packet generator)
* CDP (CDP generator)
* DNSSpoof (DNS spoofer)
* Nemesis-DNS (DNS packet generator)
* DHCPX (DHCP flooder)
* Hping2 (Packet generator)
* ICMPRedirect (ICMP redirect packet generator)
* ICMPUSH (ICMP packet generator)
* Nemesis-ICMP (ICMP packet generator)
* Packit (Traffic inject/modify)
* TcPick (Packet stream editor)
* Yersinia (Layer 2 protocol injector)
* Fragroute (Egress rewrite)
* HSRP (HSRP generator)
* IGRP (IGRP injector)
* IRDP (IRDP generator)
* IRDPresponder (IRDP response generator)
* Nemesis-IGMP (IGMP generator)
* Nemesis-RIP (RIP generator)
* File2Cable (Traffic replay)
* Fragrouter (IDS evasion toolkit)
* Nemesis-IP (IP packet generator)
* Nemesis-TCP (TCP packet generator)
* Nemesis-UDP (UDP traffic generator)
* SendIP (IP packet generator)
* TCPReplay (Traffic replay
* Etherwake (Generate wake-on-LAN)


[edit]
Bluetooth

* BTScanner (Bluetooth scanner)
* Bluesnarfer (Bluesnarf attack)
* Ghettotooth (Bluetooth scanner)
* Kandy (Mobile phone tool)
* Obexftp (Obexftp client)
* Phone manager
* RFComm (Bluetooth serial)
* RedFang (Bluetooth bruteforce)
* USSP-Push (Obex-push)
* XMinicom (Terminal)


[edit]
Wireless

* apmode.sh (Act as accesspoint)
* Airpwn (Client penetration)
* Hotspotter (Client penetration)
* GpsDrive
* start-gps-daemon (GPS daemon)
* stop-gps-daemon (GPS daemon)
* ASLeap (LEAP/PPTP cracker)
* Genkeys (Hash generator for ASLeap)
* Airforge
* File2air (Packet injector)
* Void11
* Void11-Hopper (Channel hopper)
* GKismet (Graphical wireless scanner)
* GPSMAP (wireless mapping)
* KLV (Kismet Log Viewer)
* Kismet (Ncurses wireless scanner)
* Wellenreiter (Graphical Wireless scanner)
* 802ether (Dumpfile format convertor)
* airodump (Traffic recorder)
* aircrack (Modern WEP cracker)
* Aireplay (Wireless packet injector)
* Wep_Crack (Wep Cracker)
* Wep_Decrypt (Decrypt dump files)
* Airsnort (GUI based WEP cracker)
* ChopChop (Active WEP attack)
* DWEPCrack (WEP cracker)
* Decrypt (Dump file decrypter)
* WEPAttack (Dictionary attack)
* WEPlab (Modern WEP cracker)
* Cowpatty (WPA PSK bruteforcer)
* changemac.sh (MAC address changer)


[edit]
Bruteforce

* ADMsnmp (SNMP bruteforce)
* Guess-who (SSH bruteforc)
* Hydra (Multi purpose bruteforce)
* K0ldS (LDAP bruteforce)
* Obiwan III (HTTP bruteforce)
* SMB-Nat (SMB access scanner)
* TFTP-bruteforce
* VNCrack (VNC bruteforce)
* Xhydra (Graphical bruteforcer


[edit]
Password cracker

* BKHive (SAM recovery)
* Fcrackzip (Zip password cracker)
* John (Multi-purpose password cracker)
* Default password list
* Nasty (GPG secret key cracker)
* Rainbowcrack (Hash cracker)
* Samdump2 (SAM file dumper)
* Wordlists (Collection of wordlists)


[edit]
Forensics

* Autopsy (Forensic GUI)
* Recover (Ext2 file recovery)
* Testdisk (Partition scanner)
* Wipe (Securely delete files)


[edit]
Honeypot

* IMAP
* POP3
* Honeyd (Honeypot)
* IISEmulator (Honeypot)
* Tinyhoneypot (Simple honeypot)


To finish this will all run of a cd/dvd all you need to do is slap the disk in and boot form it.


Hope that helps a little more ;)

BTW remember this is illegal and personal i have never done this and dont intend to the links are purly for educational purposes and to hack you OWN phone ;)


Aslo how to extend your bluetooth range http://trifinite.org/trifinite_stuff_bluetooone.html
 
Last edited:
so whats the verdict then has any1 found anything usefull
 
Back
Top