Blooover is a tool that is intended to serve as an audit tool that people can use to check whether their phones and phones of friends and employees are vulnerable.
Since the application runs on handheld devices and sucks information, it has been called Blooover (derived from Bluetooth Hoover).
Here you find the Blooover tool as a .jar file for download. It is supposed to run on every phone that is equipped with a J2ME MIDP 2.0 VM and an implemented JSR-82 API (important for Bluetooth access). As far as I know, the Nokia 6600, Nokia 7610, Sony Ericsson P900, Siemens S65 (and probably al consequent phones of the mentioned manufacturers) to fulfill these requirements.
Installation
When you intend to install the application, you should be using a phone that has the Java Bluetooth API implemented. Phones with this feature are listed on this page.
Once you downloaded the file, make sure that it is called Bloover.jar (not Blooover.zip). After this, you can either transfer the application to your phone via the phone software on your pc or over Bluetooth and IR devices.
About Blooover II
Blooover II is the successor of the very popular application Blooover. Besides the BlueBug attack, Blooover II supports the HeloMoto attack (which is quite close to the BlueBug attack), the BlueSnarf and the sending of malformed objects via OBEX.