You undoubtedly have various Bluetooth‐enabled wireless devices, such as laptops and smartphones, running within your organization. Although vulnerabilities are not as prevalent as they are in 802.11‐based Wi‐Fi networks, they still exist (currently, over 100 Bluetooth‐related weaknesses are listed at http://nvd.nist.gov), and quite a few hacking tools take advantage of them. You can even overcome the personal area network distance limitation of Bluetooth’s signal (typically just a few meters) and attack Bluetooth devices remotely by building and using a BlueSniper rifle. (click on the name given below to download.) Various resources and tools for testing Bluetooth authentication/pairing and data transfer weaknesses include:
✓Bluelog — part of Kali Linux
✓Btscanner — part of Kali Linux
Many (arguably most) Bluetooth‐related flaws are not high risk, they still need to be addressed based on your own unique circumstances. Make sure that Bluetooth testing fall within the scope of your overall security assessments and oversight.
NOTE: This is for educational purpose only we are not responsible for any type of inconvenience caused by reader.