Several software programs are available for spoofing MAC addresses. One such tool is spooftooph, which is used in Linux to automate the spoofing or cloning of Bluetooth devices.
NAME spooftooph SYNOPSIS spooftooph -i dev [-mstu] [-nac]|[-R]|[-r file] [-w file] DESCRIPTION -a <address> : Specify new BD_ADDR -b <num_lines> : Number of Bluetooth profiles to display per page -B : Disable banner for smaller screens (like phones) -c <class> : Specify new CLASS -h : Help -i <dev> : Specify interface -m : Specify multiple interfaces during selection -n <name> : Specify new NAME -r <file> : Read in CSV logfile -R : Assign random NAME, CLASS, and ADDR -s : Scan for devices in local area -t <time> : Time interval to clone device in range -u : USB delay. Interactive delay for reinitializing interface -w <file> : Write to CSV logfile (Useful in Virtualized environment when USB must be passed through.)
Examples:
spooftooph -i hci1 -a 00602560AA43
This will use the Bluetooth interface hci1 to spoof itself as the device having MAC Address 00602560AA43.
spooftooph -i hci1 -R -w outputfile
This will use the interface hci1 and assign itself a random MAC address. The results will be stored in the CSV logfile “outputfile.”
Similarly, the -r option reads the CSV log file.
spooftooph -i hci1 -s
This will scan for Bluetooth devices in the local area within the range.
I hope this helps. Interested readers can find other articles on Bluetooth Security here: Bluetooth Security Course
Interesting article. I found your website is really educative, thanks!
Thanks @celebov.