Wireless Attacksbluetoothdiscoverybruteforcenon-discoverable

RedFang

RedFang locates non-discoverable Bluetooth devices by brute forcing the last six bytes of the Bluetooth address and performing read_remote_name operations. It is a proof-of-concept tool for finding hidden Bluetooth devices.

Description

RedFang is a small proof-of-concept application designed to find non-discoverable Bluetooth devices. This is achieved by brute forcing the last six bytes of the Bluetooth address and executing a read_remote_name() operation. The tool was originally developed by Ollie Whitehouse with enhancements for threading by Simon Halsall and device info discovery by Stephen Kapp.

Use cases include Bluetooth security assessments where devices may have discoverability disabled, making them invisible to standard scanning tools. It supports scanning specific address ranges and outputting results to a log file. The tool assumes devices are on hci0 to hci(n) interfaces based on the number of threads.

RedFang is particularly useful in wireless penetration testing to identify hidden Bluetooth peripherals or devices that could be vulnerable to further attacks.

How It Works

RedFang brute forces the last six bytes of the Bluetooth device address within a specified range by attempting connections and performing read_remote_name() inquiries. It uses multiple threads across hci0 to hci(n) interfaces, where n is threads minus one. The default connect timeout is 10000, which can be adjusted. Addresses can be specified directly or using manufacturer prefixes listed with the -l option followed by the address tail.

Installation

bash
sudo apt install redfang

Flags

-rrange i.e. 00803789EE76-00803789EEff
-ofilename Output Scan to Text Logfile
-ttimeout The connect timeout, this is 10000 by default
-sdiscover Bluetooth devices
-hDisplay help
-llist manufacturer prefixes for use with manf+nnnnnn address format

Examples

Scan the given range and discover Bluetooth devices
fang -r 00803789EE76-00803789EEff -s
Scan the specified address range for non-discoverable devices
fang -r 00803789EE76-00803789EEff
Scan range and output results to a text logfile
fang -o logfile.txt -r 00803789EE76-00803789EEff
Scan range with increased connect timeout of 15000
fang -t 15000 -r 00803789EE76-00803789EEff
Display help and usage information
fang -h
List manufacturer prefixes for address specification
fang -l
Scan using manufacturer prefix plus address tail range
fang -r manf+EE76-EEff
Updated 2026-04-16kali.org ↗