Hello, everyone, welcome back to breaking stuff with Joe I, as always in North eponymous host Joe Perry. And today we're going to be having a first in the breaking stuff with Joe Siri's. Because this is gonna be the first time that we talked about a wireless exploitation tool, the specific tool that issue crackle,
a Bluetooth exploitation and cracking tool that is absolutely, phenomenally powerful
and provides the ability to gain access to otherwise private Bluetooth channels. It's a very simple tool, very, very straightforward, a single line command,
but it's one of the more powerful and versatile tools we're gonna talk about in the series.
Since we're discussing Bluetooth hacking and we're discussing the concept of breaking into Bluetooth connections, we're gonna spend a little bit of time talking about just how vulnerable and dangerous Bluetooth really can be, because it is a terrifying technology of your work in security. Bluetooth is a nightmare. It provides such a massive attack service.
It's a very poorly understood standard by a lot of people who implemented,
and it just it potentially introduces a shopping number vulnerabilities into a system.
So, of course, this video is gonna be mainly focused on pen testers, particularly pen testers. We're looking for that initial access to a given target and are trying to think outside the box a little bit along the way. So the course of this video, we're gonna see how we run. Crackle. We're gonna discuss how we construct the necessary p cat file,
how you can crack a temporary key and extract long term and short term keys with that temporary key.
And of course, as part of that process, we're gonna understand every step along the way about why Bluetooth is dangerous. So stay tuned. It's gonna take us about 10 minutes, and you're going to get to understand how you could use crackle every day to break stuff.
So here we are, as always, in our trusty Callie V. M. And before we actually jump into this tool and show how it works because it's a pretty simple tool. The youth I do want to take a second. And as I alluded to in the intro, gonna talk about why Bluetooth is such a frustrating
tool or technology for security professionals, and it comes down pretty simply to the fact that Bluetooth was not designed with security in mind. Generally speaking, when people are using Bluetooth devices, they're doing them very close. You know, a near field kind of communication. Att. The distance of kind of an NFC, you know, just a couple of feet from your phone, your Bluetooth headset
or your phone, your car
or your TV to your audio bar, whatever you might be using. But Bluetooth is designed for these very sort of intimate uses, and because of that, it's not a particularly secure tool. It's not a particularly secure technology. The issue there comes into the fact that even though it's being used for the short range communications,
Bluetooth can travel further than you would anticipate.
And often when people are trying to, you know, break in, they'll do a break. You know your Bluetooth security or get access to your tools.
What they'll do is something called war driving, where they'll actually go in a car, driving around the neighborhood with a Bluetooth sniffer, basically just looking to see if they can find any errant connections or any communication happening that they could get access to.
And, you know, we tend to think of tools and technologies like Bluetooth. Is this sort of one toe, one just direct connection.
But that's just not fundamentally how radiation works, which is what this really is, is just radio energy. And so, because of that, Bluetooth is sending all of this data just out in, however, you know, whatever the strength of that signal might be, anyone in that area can get access to that communication. And if they're capable of decrypting it with a tool like, for example, crackle,
they're going to be capable of actually breaking and taking control of your systems. And so you know, I mentioned earlier all the different uses of Bluetooth and one of the dangers. There is the idea
that Bluetooth is going to be connecting to
you know it's gonna come from your phone or from your headphones or from your sound bar or whatever, but it's connecting back to your phone or your car or your computer. You know these tools that you use for very important tasks that you might have great security on them normally.
But this Bluetooth provides a huge attack vector that a lot of people don't secure properly or don't even consider needing to be secured. No, Bluetooth has definitely made great strides in the last several years of increasing security. But it's still a huge attack factor for security, personal for security professionals
and shall we say, less
civic minded people. So that's why that's my little mini random Bluetooth and why I absolutely hate it on a personal level, even though I will admit that I do still use it on some of my my own tool, my own stuff at home.
But it is definitely a security risk and one that you should be conscious off. And to illustrate that we're gonna talk here very, very briefly about the tool crackle. And as I mentioned in the intro, Crackle is just a Bluetooth hacking tool you can use to retrieve a temporary key. And from that potentially rich retrieve the long term keys for a Bluetooth connection and completely decrypt it.
And what we're gonna do here is I'm gonna show you just how easy crackle is to use,
and I'm going to show you. Ah, very quick
cracking a temporary key and pulling it up. So to get crackle, it doesn't mess. It doesn't come installed by default on all versions of Callie, so to get it. You're just gonna want to run a pseudo
Sorry I could get installed
there. You and of course, I already have it. But once it runs, it'll install crackle on your system. You'll be able to use it if you want to play around and kind of learn to use crackle effectively. I highly recommend you go through on Get Husband will include the link below this video There. Some sample files on the crackle. Get for learning Thio
for learning to use the stool to crack Bluetooth connections
so Crackle is going to take as its input
a single peak cap file. And one of the things that I absolutely love about the stool is that it is very, very nearly idiot proof. There are almost no arguments to it. It's very simple. Given the input pea cap. Give it the output pea cap, and if you have a long term key, give it the long term key
S so you can just I mean, it's almost no really use to it, and almost no real complex used to it. It's just a straightforward Give it your pea cap and it's gonna make it work now for the peacock to be effective. You can see here
there are some things that you need to do to make sure you're giving it a useful peek out. And to do that, what you're actually looking for is it needs to have a complete parent between two Bluetooth devices. So whenever the headphones or whatever is first connecting to
the car or the phone or whatever, it's where is acting is the server. In this case, you need to have captured that traffic. And as long as you do that, then Crackle is gonna be able to pull out that temporary key from the blue too.
Sorry about that. I started disabled slack notifications, but I'm just the worst.
So here in my crack a folder, you'll see that I have a peek out file. This is one that I pulled off of that get have. It's a very, very simple file that's gonna show us just sort of that the use of crackle and how quickly it can work.
We're gonna go and we're gonna run, crackle,
and then we're going to give it attack. Oh, and we'll just say decrypt dot cat
And there you can go in just a couple of seconds it jumped through. Found the temporary key, which admittedly, in this case is straight zeros, which is a very, very insecure key. Obviously makes it much easier to crack. But it found that key almost immediately. And you can see that it gives you a little bit of information about the fact that the packet that we use is actually very short. It's not properly encrypted.
So it skipped that first packet, and then it found
right here the long turkey. So now, with this long term key, you can remember from when we were looking just a second ago.
You can see here that if you want to run it with the long term key,
you just type attack l with the key that you were given back, sir,
Let's run this again real fast and see what we can get.
Because it was very silly and forgot to copy Paste.
There we go.
So we're just gonna copy that? Lt k clear this again,
and then we will do crackle
protect. Oh, final
and then talk l and you just give it
and run it
and you can see that it processed a total of 709 packets, but it didn't actually decrypt any on. The reason for that, actually, is because,
for whatever reason, most of these packets are too short to be decrypted. Aren't actually the Bluetooth connection. But what's important here is that we were able to very quickly give it the long term key and was able to go through and identify all of the blue to traffic break the original temporary key. And now we're able to break any communication that happens across this Bluetooth.
Now, the reason why we weren't able to film or information or doom or decrypting.
It's pretty simple. This was the most basic example file of Pea Cap. I pulled it down just to kind of give us the very quick overview. If you want to play around more like I said, we'll have the link for the get hub underneath this video and you'll be able to pull down all the files that they have their in their tests directory and play with that against crackle. It's a phenomenal tool,
very useful, and hopefully now you can see just how dangerous Bluetooth is.
You could see how quickly *** that we cracked that pea cap. And even more than seeing how dangerous Bluetooth is, hopefully you can see how in your own penetration testing work, this particular tool is a very, very quick way to gain entrance to otherwise six year networks. So thank you all for watching. As always, this has been breaking stuff with Joe, and I have been your upon its host, Joe Perry.
How to Use TOR (BSWJ)
In this course we review some of the most powerful cybersecurity tools available for use ...
Certificate of Completion Offered
How to Use tcpdump (BSWJ)
TCPDump is one of the best light-weight utilities for performing network traffic capture. It's extremely ...
Certificate of Completion Offered