1 min read
Blooover II is the successor of the very popular application Blooover. After 150000 downloads of Blooover within the year 2005 (since the initial release in at 21c3 in December 2004), a new version of this mobile phone auditing toool is on its ready. Besides the BlueBug attack, Blooover II supports the HeloMoto attack (which is quite close to the BlueBug attack), the BlueSnarf and the sending of malformed objects via OBEX.
Blooover II has been released at 22C3 in December 2005 in Berlin, Germany.
Please use this Program responsible.
Blooover II is free for non-commercial purposes.
For questions about the Blooover II application, feel free to ask Martin Herfurt.
Years after releasing this tool, I received many e-mails in which people told me that they bought the Blooover application from shady places on the Internet.
Just to be clear: I never earned any money with this application, nor was I giving my consent to selling it!
Martin is an independent security researcher focusing - but not exclusively - on various aspects of product security related to Bluetooth wireless technology. As one of the co-founders of the trifinite.group, Martin worked with the Bluetooth SIG, helping the technology and its adopters overcome early design and implementation issues.