I just happen to have an old Admire and Continuum that I wanna practice on using my Optimus M (2.2.2 and rooted). I'd love to know how it's done and try it out on my phones, more so the bluebugging or bluesnarfing cuz I've seen apps that let you bluejack with ease. I've seen stuff along the lines of bloover/blooover, RedFang, and Carwhisperer. FreeAndroidSpy is the world's first 100% free and invisible cell phone spy application for Android smartphones and tablets. Once the application is installed you will be able to spy on the smartphone's location, access the entire contact lists, see all the images and videos on the smartphone, current information about the device and more! TubeMate 3 is the third official version of one of the best apps when it comes to downloading YouTube videos onto your Android. Thanks to this app you can store all your favorite YouTube videos locally onto your device memory and watch them later on at your leisure without an Internet connection.

I would also like to know but searching the internet actually turns up lots of pages that talk about it and no tutorials on how to use bloover or bloover II.
I have looked on the trifinite.org for help but all it does is send me around in loops back to the same page. I am looking for help on what the terms actually mean and how to do things like grab a users SMS or Contact list but theirs not a fat lot of help.
In my case IM looking to use it to deter alot of hoddies that do not live on the close I live on and my intention is to use it as a tool to gather intelligence on that social network.
So any links to actual tutorials that are not jargoned up would be nice, I can get Bloover to search and it finds devices as 'Unknown' like it found about 15 devices, 3 of which I know to belong to the taxi driver that lives at the end of my block but the other 12 definately belonged to the gang on the block.
The police are having a tough job of chasing this group down and even a couple of the devices handset numbers would help them target the individuals from the handset numbers.
So far this gang has been responsible for 4 muggings and the paper girl has obviously been intimidated as she now refuses to deliver any papers on the close. This group in their attacks are using 'Splinter cell' type tactics, I have been targeted as well on 2 occasions and in a nut shell they have P'd me off as has the family that moved in 7 weeks ago, they have brought this lot with them under the guise of friends and the hoodies are abusing the 'friends' aspect to justify them being in an area that they really do not have reason to be in.
So this proof of concept tool could be put too good civic & public use for the public good & safety.
I know my first attempt failed and it must have made some kind of impression because my second scan only turned up 3 devices!
Any help would be appreciated.
(My username.. well IM a fan of the Fonejacker, Channel 4 and hope the series returns soon as it was original and far better than anything else C4 has produced in along time)

Everybody is having a Bluetooth phone nowadays,and we are merely concerned about the safety of these vulnerable and penetrable devices. BE it Nokia,Sony or any other brand,the technology remains same and provides whackers (wireless malicious hackers) new playground for their experiments.In this article,I will be listing some Bluetooth tools for security – both breaking and making.


It is a security and Bluetooth penetration testing suite and implements attacks like BlueSnarf,BlueSnarf++ and BlueSmack. It features Bluetooth address spoofing,socket shells like AT and RFCOMM and also implements tools like L2CAP packet generator and connection resetter and RSCOMM scanner which are a must for any Bluetooth security enthusiastic.


Blooover (and Blooover 2) is a tool that is intended to run on J2ME enabled cell phones that appear to be comparably seamless.It serves as an audit tool that people use to check if their phones and phones of friends :P are vulnerable or not. /agfa-cr-30-x-user-manual/.

Also there is also a tool “Super Bluetooth Hack” which is quite popular nowadays to hack into Bluetooth devices.


Medieval Bluetooth Network Scanner

This program can analyze and scan your Bluetooth network, giving detailed information about local and remote devices found. You can also browse supported services of each device in a clear and straightforward user-interface. If you have a Bluetooth dongle installed on your PC, download 'Medieval Bluetooth Network Scanner' now, it's totally free of charge and very handy!

It can deep scan all services of your Bluetooth device using this software.

These software are free to use and quite handy to audit.However you,you ought to follow some basic rules of Bluetooth security for maximum protection-

Download Bloover 2 For Android Apk

  • Switch off Bluetooth when not in use.
  • Purchase only devices having long PIN codes.
  • Refrain from entering the PIN into Bluetooth device for pairing.
  • Limit the electric power itself to keep range of network within physical area (for Bluetooth enabled routers and devices other than cell phones).
  • Always generate initialization keys when 2 Bluetooth devices meet for the first time.
  • Never allow auto connection (Big loophole in Cell phone devices,easily exploited by a bit of social engineering).

Keep Learning


Download Bloover 2 For Android Free

Technorati Tags: cellphones and mobiles,Hacking,hacking tools,security,software downloads,rdhacker,prohack,blooover,super bluetooth hack,bluediving,bluesnarf,tutorials,bluejack
realfoodmatters.co – 2018