Usage : To modify the Bluetooth adapter, spooftooth must be run with root privileges. Spooftooph offers five modes of usage:
Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will only list one of the devices if more than one device in range shares the same device information when the devices are in Discoverable Mode (specificaly the same Address).
- Clone and log Bluetooth device information
- Generate a random new Bluetooth profile
- Change Bluetooth profile every X seconds
- Specify device information for Bluetooth interface
- Select device to clone from scan log
1) Specify NAME, CLASS and ADDR.
roo[email protected]: spooftooph -i hci0 -n new_name -a 00:11:22:33:44:55 -c 0x1c010c
2) Randomly generate NAME, CLASS and ADDR.
[email protected]: spooftooph -i hci0 -R
3) Scan for devices in range and select device to clone. Optionally dump the device information in a specified log file.
[email protected]: spooftooph -i hci0 -s -w file.csv
4) Load in device info from log file and specify device info to clone.
[email protected]: spooftooph -i hci0 -r file.csv
5) Clone a random devices info in range every X seconds.
[email protected]: spooftooph -i hci0 -t 10
Download Spooftooph 0.5.2