Scans nearby area for Bluetooth devices and displays them for clients, clients are able to connect via a WebSocket (port 8765). Note this is horrendously insecure and should NEVER be used in a production environment. From the vulnerabilities created by Pickle to the potential Man in the Middle attacks and non authenticated non encrypted websockets. Also attempts to detect duplicate devices using the same bluetooth mac addresses. Red represents a potential duplicate. Yellow represents unknown information Green is known safe.
git clone https://github.com/redd-rl/bluetooth-scan.git
cd bluetooth-scan
python -m pip install -r requirements.txt
Then run the corresponding file for your OS, out of run_windows.bat
, run-mac.sh
and run_linux.sh
Prior knowledge here is assumed but the process is similar.
git clone https://github.com/redd-rl/bluetooth-scan.git
cd bluetooth-scan
python -m pip install -r requirements.txt
python client.py
python monitor.py
If bluetooth_ids.json isn't present ALL manufacturers will show up as their CIC ids, as reported from the bluetooth device.