13.2 - Bluetooth Hacking

 13.2 - Bluetooth hacking 

 

Key Terms: 

    • BlueSmackingA Bluetooth denial-of-service attack. 
    • Bluejacking – An attack that sends unwanted data to a Bluetooth device. 
    • Bluesnarfing – An attack that uses the OBEX protocol to gain access to a Bluetooth device. 
    • BluesniffingUsing Bluesniff wardriving to find Bluetooth devices. 
    • Bluebugging – An attack that exploits a Bluetooth device to install a backdoor and bypass the normal authentication. 
    • BluePrintingGathering details about a Bluetooth device. 
    • Bluetooth MAC spoofing – Changing the device address of a Bluetooth device. 
    • BluetoothViewA small utility that lists discoverable Bluetooth devices. 
    • BTScannerA Bluetooth sniffing tool. 
    • BtlejuiceA framework for performing MITM attacks on Bluetooth devices. 
    • BluedivingA penetration testing suite used to implement BlueBug, BlueSnarf, and BlueSmack attacks. 
    • Super Bluetooth Hack – An Android application that can be used to view the files on another Bluetooth connected Android phone. 

 

Bluetooth Threats 

Many business professionals use Bluetooth devices to manage their calendars and schedules which can be leaked. Also, software can access the microphone and camera on Bluetooth enabled devices making them susceptible to eavesdropping. Bluetooth devices can also be used to make phone calls remotely and control an internet connection. 

 

Countermeasures 

Make sure Bluetooth devices are using security mode 4 (the highest security mode). Also make sure to set pairing keys in non-regular patterns unlike sequential numbers. You could also just disable Bluetooth and only enable it when needed. Bluetooth hidden mode can also be used to hide the device from scanners. 

Comments

Popular posts from this blog

OSA Assignment 1 - Task 3 GUIDE

OSA Assignment 1 - Task 1 GUIDE

OSA Summer 2023 Mock - Task 1, Assignment 1