13.2 - Bluetooth Hacking
13.2 - Bluetooth hacking
Key Terms:
- BlueSmacking – A Bluetooth denial-of-service attack.
- Bluejacking – An attack that sends unwanted data to a Bluetooth device.
- Bluesnarfing – An attack that uses the OBEX protocol to gain access to a Bluetooth device.
- Bluesniffing – Using Bluesniff wardriving to find Bluetooth devices.
- Bluebugging – An attack that exploits a Bluetooth device to install a backdoor and bypass the normal authentication.
- BluePrinting – Gathering details about a Bluetooth device.
- Bluetooth MAC spoofing – Changing the device address of a Bluetooth device.
- BluetoothView – A small utility that lists discoverable Bluetooth devices.
- BTScanner – A Bluetooth sniffing tool.
- Btlejuice – A framework for performing MITM attacks on Bluetooth devices.
- Bluediving – A penetration testing suite used to implement BlueBug, BlueSnarf, and BlueSmack attacks.
- Super Bluetooth Hack – An Android application that can be used to view the files on another Bluetooth connected Android phone.
Bluetooth Threats
Many business professionals use Bluetooth devices to manage their calendars and schedules which can be leaked. Also, software can access the microphone and camera on Bluetooth enabled devices making them susceptible to eavesdropping. Bluetooth devices can also be used to make phone calls remotely and control an internet connection.
Countermeasures
Make sure Bluetooth devices are using security mode 4 (the highest security mode). Also make sure to set pairing keys in non-regular patterns unlike sequential numbers. You could also just disable Bluetooth and only enable it when needed. Bluetooth hidden mode can also be used to hide the device from scanners.
Comments
Post a Comment