by alchemydragon on Fri Oct 31, 2008 8:44 am ([msg=14322]see bluetooth hunting[/msg])
I have done this and I just wanted to ask if anyone else has and what you found interesting. I did this at a local mall in the food court where my father-in-law has a buisness, and I found a blackberry and a phone with the name of "LooseLucie". i actually was able to connet to the blackberry and since he had file sharing turned on I could see and if wanted to download his buisness files. He worked in the accounting department so it was tempting. Cell phones are fun to play with!!!!
by alchemydragon on Tue Nov 11, 2008 10:02 am ([msg=14805]see Re: bluetooth hunting[/msg])
I know why it is not documented well, becouse in order for it to work either you have to get the target to think you are a trusted device (like i normally do if they have a bluetooth head set) or get lucky that they have a device that has accept all request setting turned on. But it is fun to do.
by beagle on Tue Nov 11, 2008 10:33 am ([msg=14808]see Re: bluetooth hunting[/msg])
Once I got a guy to freak out because I named my device "Secret Service", and was trying to connect to his bluetooth-enabled laptop, so every few seconds he would get a little pop-up message on his screen saying "Secret Service wants to connect to you!"