Scan/Exploit Blueborne CVE-2017-0785# Blueborne CVE-2017-0785
This CVE and all the other BlueBorne CVEs are explained here: https://www.armis.com/blueborne/
This project was a proof of concept for a talk I gave in 2017.
It simply performs a scan, prints out probably vulnerable hosts based on MACs and then runs the exploit on the target of your selection (if the device is actually vulnerable you will see a hex printout, if you run the exploit against a patched system nothing will return).
## Usage:
`python bluebornescan.py`
## References:
https://github.com/hook-s3c/blueborne-scanner
https://github.com/ojasookert/CVE-2017-0785
Pulled code from these two repos, polished it up a bit, and ported to python 3.
[4.0K] /data/pocs/32caa45cd7ba43ee189a91a1ae78d184057cd2a0
├── [1.5K] bluebornescan.py
├── [1.5K] cve20170785.py
├── [1.0K] LICENSE
├── [6.8K] notes.txt
├── [ 691] README.md
└── [ 24K] vulndevices.py
0 directories, 6 files