6 | | It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode (using more than one hci device). |
7 | | Programming languages: Perl and C |
8 | | Supported operating systems: GNU Linux 2.4 / 2.6 and FreeBSD |
| 6 | It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode (using more than one hci device). [[br]] |
| 7 | Programming languages: Perl and C [[br]] |
| 8 | Supported operating systems: GNU Linux 2.4 / 2.6 and FreeBSD [[br]] |