


It’s an advice to all the multimedia phone users to keep off your Bluetooth and if any harm will occur then we do not take any responsibility. With this software you give the complete freedom to hackers, to send a “corruption code” to you which will completely shut-down the phone down and make it unusable for you.ĭisclaimer: I have outlined these software for your information and knowledge purpose only. BlueSnarfingīluesnarfing is a method of hacking into Bluetooth-enabled mobile phones and with this, you can copy its entire information like contact book, etc. It implements Bluejacking and BlueSnarfing attacks. It scans for other devices in range and performs service queries. BTCrawlerīT Crawler is a scanner for Windows Mobile Based devices. One can browse device information and all supported profiles and services records of each device. BTBrowserīT Browser is a J2ME application which can browse and explore the technical specification of surrounding Bluetooth-enabled devices. By exploiting these vulnerabilities one can access phone-book, call lists, and other information of that device. This simply exploits the BlueBug (name of a set of Bluetooth security holes) vulnerability of the Bluetooth-enabled devices. Blue SniffīlueSniff is a simple utility for finding discoverable and hidden Bluetooth-enabled devices. Blue Scannerīlue Scanner searches out for Bluetooth-enabled devices and tries to extract as much information as possible for each newly discovered device in other words one can use this one to spy on others who are close.


In addition to it, it will display information about battery, network, and sim card. Phone list and SMS can be stored in HTML format. This software is used for controlling and reading information from a remote phone via Bluetooth or infrared.
