Ticker

6/recent/ticker-posts

A Bluetooth Control Script for DDOS Bluetooth Devices Using L2Ping Of Death

Before starting this guide, can you name any smart device without Bluetooth integration? It's highly unlikely, as Bluetooth is the most commonly used technology for pairing devices. If you were born in the 90s, you may remember it as the first wireless file transfer technology for mobile phones of that era.

In today's article, I'll show you a Python script that can perform a DDoS(Denial Of Services) attack and allows the user to scan for (annoying) nearby devices, perform "L2Ping of Death" tests, and also allows to send thousands of beacons to connect to BT devices via RFCOMM.

Party Pooper

This is a Python Toolkit with a set of functions for controlling Bluetooth devices on a Linux system. It allows the user to scan for (annoying) nearby devices, perform "L2Ping of Death" tests, and also send thousands of beacons to connect to BT devices via RFCOMM. It is your perfect sidekick when neighbors keep playing "Despacito" and Finitum on Sunday mornings!

So without wasting more time, let's dive into it's hands-on guide:
git clone https://github.com/e-m3din4/party-pooper
cd party-pooper && python3 Party-Pooper.py
Now you can see the menu on your terminal and follow the prompts to enter any required information, such as a Bluetooth device address. -An Xterm window will be launched to run the selected command. The user must manually close the window to return to the script menu.

Limitations

  • This script assumes that the Bluetooth service is already running on the system. If it is not running, the user must start it manually before running the script.
  • This script does not include any error handling or error messages. If any of the subprocess commands fail, they will simply fail silently.
  • This script has only been tested on Linux systems with the xterm, hcitool, l2ping, and rfcomm commands installed. It may not work on other systems or configurations.

Disclaimer

It is important to obtain consent before accessing someone else's device as unauthorized access is not only impolite and illegal but may also result in social consequences. People may not want to invite you to social gatherings, and your friends may find you unpleasant to be around if you are known for engaging in such behavior.