Clone this wiki locally
- What is the latest release?
- I run Windows or Mac OS X. What's the best way to use Ubertooth?
- How do I update firmware?
- Can I use my Ubertooth with a VM?
- What can the Ubertooth capture?
- Can I listen to my phone calls?
Q: What is the latest release?
A. The latest release is 2015-10-R1. See the Build Guide for instructions on how to download and build the software.
Q: I run Windows or Mac OS X. What's the best way to use Ubertooth?
It may be possible to use Ubertooth from within a virtual machine. However, people have reported issues with USB throughput and requests timing out. If you're a newbie, booting directly into Linux is the recommended method.
Q: How do I update firmware?
A. Refer to the wiki page Firmware
Q: Can I use my Ubertooth with a VM?
A. Yes. Many people have reported successfully using their Ubertooth with host tools installed in a virtual machine. There are, as always, some things to be aware of when attempting this.
- The Ubertooth uses USB2.0, which requires the VirtualBox extension pack to be downloaded and installed.
- The Ubertooth also uses differnet vendor and product identifiers when in normal operation and firmware upload mode, rules for both of these will need to be added to the virtual machine for full operation.
Other virtual machine environments may differ and therefore present differnet issues. If you successfully use the Ubertooth with a different virtualisation system, please let us know so that we can help future users.
Q: What can the Ubertooth capture?
A. The Ubertooth is able to capture and demodulate signals in the 2.4GHz ISM band with a bandwidth of 1MHz using a modulation scheme of Frequency Shift Keying or related methods.
This includes, but is not limited to:
- Bluetooth Basic Rate packets
- Bluetooth Low Energy (Bluetooth Smart)
The following may be possible:
- 802.11 FHSS (1MBit)
- Some proprietary 2.4GHz wireless devices
Q: Can I listen to my phone calls?
A. Not yet, this will require full frequency hopping support and possibly require breaking encryption by sniffing the connection process. It's on the todo list, but there's a lot of hard work to go before we get there. If you're interested in making it happen, you can get involved in the project.