How To Hack Smartphone Bluetooth Using Kali Linux


Let’s start the hack.

Step 1: Fire up your Kali Linux.

If you don’t have Kali Linux setup then you might need to follow this tutorial to fire up Kali Linux.

Step 2: First let’s configure Bluetooth Open terminal and type:


This is bluesnarfer don, now for bluebugger:


Step 3: and type the hciconfig to enable your Bluetooth Adapter


Step 4: Scan for Bluetooth devices.

For this purpose you can use hcitool. This is a command line tool.


Now, let’s try the inq command in hcitool to get more information about these devices:


It also displays clock offset and the class. The class indicates what type of Bluetooth device it is.

You can see list of more option by typing hcitool.

Step 5: Scan for Services with sdptool.


or you can use this command also…


If you ask me what this shows. I don’t know. But yes it shows you all the services and channels.

Service discovery protocol (SDP) is a Bluetooth protocol. And it helps you to search for services running on the device.

Step 6: Ping the device with L2ping command.


If you don’t get a ping then good luck.

Step 7: Hacking Start

Type bluesnarfer.


And you will see its options. Now we have some options let’s type:




Now for bluebugger Type:


Again, you’ll see some results. And if you are getting any error type



  • Nelly Benson

    Cyberwebkey484 are a hacking group , a the product of the coming together of Hackers from various hacking communities and groups , (pentaguard ,CyberBerkut , RedHack , Anonymous ) we have existed for over 12 years our system is a very loose and decentralized command structure that operates on ideas rather than directives. : we have only one contact email cyberwebkey484 at gmail dot com we will be happy to have you join over 2000 satisfied clients around the world to use our services. We provide prove of job before payment We offer services like ★ Hacking Whatsapp account giving you access to the person’s whatsapp messages and history . ★ Initiating Bank Wire Transfers at a resonable fee and completely untracable . ★ Hacking any smart phone giving you access to all activities on the phone like , text messages , call logs , instant messenger chats and other information. ★ Hacking Facebook , Instagram , Twitter and every other social networking website. ★ Hacking Websites to deface , retrive information, edit information or give you admin access . ★ Hacking into school’s websites (server) to change grades without any trace . . ★ Hacking any email service provider like Gmail , Yahoo, Comcast , Aol , Hotmail any others . ★ Hacking and selling credit cards , amazon , walmart , paypal , bank logs . ★ Selling of untracable phones (even the pentagon can not track our phones). . ★ Selling of Botnet , Spywares , RAT , Trojans , Worms and we can make it customize for you. Thank you. Cyberwebkey484