Preview

Hacking Bluetooth Enabled Mobile Phones and Beyond: Full Disclosure

Satisfactory Essays
Open Document
Open Document
1911 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking Bluetooth Enabled Mobile Phones and Beyond: Full Disclosure
Hacking Bluetooth enabled mobile phones and beyond – Full Disclosure
Adam Laurie Marcel Holtmann Martin Herfurt

21C3: The Usual Suspects
21st Chaos Communication Congress December 27th to 29th, 2004 Berliner Congress Center, Berlin, Germany
Bluetooth Hacking – Full Disclosure @ 21C3

Who we are


Adam Laurie
– – –

CSO of The Bunker Secure Hosting Ltd. Co-Maintainer of Apache-SSL DEFCON Staff/Organiser Maintainer and core developer of the Linux Bluetooth Stack BlueZ Security Researcher Founder of trifinite.org
Bluetooth Hacking – Full Disclosure @ 21C3



Marcel Holtmann




Martin Herfurt
– –

Outline (1)
● ● ● ● ● ● ● ●

Bluetooth Introduction History Technology Overview The BlueSnarf Attack The HeloMoto Attack The BlueBug Attack Bluetooone Long-Distance Attacking

Bluetooth Hacking – Full Disclosure @ 21C3

Outline (2)
● ● ● ● ● ●

Blooover Blueprinting DOS Attacks Sniffing Bluetooth with hcidump Conclusions – Lessons tought Feedback / Discussion

Bluetooth Hacking – Full Disclosure @ 21C3

Bluetooth Introduction (1)
● ● ● ● ●

Wire replacement technology Low power Short range 10m - 100m 2.4 GHz 1 Mb/s data rate

Bluetooth Hacking – Full Disclosure @ 21C3

Bluetooth Introduction (2)


Bluetooth SIG
– – – – –

Trade Association Founded 1998 Owns & Licenses IP Individual membership free Promoter members: Agere, Ericsson, IBM, Intel, Microsoft, Motorola, Nokia and Toshiba Consumer http://www.bluetooth.com Technical http://www.bluetooth.org

– –

Bluetooth Hacking – Full Disclosure @ 21C3

History (1)


Bluejacking
– –

Early adopters abuse 'Name' field to send message Now more commonly send 'Business Card' with message via OBEX 'Toothing' - Casual sexual liasons



Bluetooth Hacking – Full Disclosure @ 21C3

History (2)


Bluesnarfing


First publicised by Marcel Holtmann, October 2003


Wireless Technologies Congress, Sindelfingen, Germany Bugtraq, Full Disclosure

You May Also Find These Documents Helpful

  • Best Essays

    Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)…

    • 355 Words
    • 3 Pages
    Best Essays
  • Better Essays

    NETW471 Course Project

    • 2998 Words
    • 9 Pages

    Blue-tooth is a great emerging technology being used today, which also has potential for much more uses than the tradition bluetooth headset. Bluetooth connects gadgets together, helping users listen to music, talk on phones without having to deal with frustrating cords and wires. To understand how a Bluetooth connection works, I will use an example such as a phone connected to wireless speaker. First, each device is equipped with Bluetooth connectivity, a feature that requires both software and hardware components. On the hardware side, an antenna-equipped chip in both devices sends and receives signals at a specific frequency. The software interprets incoming Bluetooth signals and sends them out in ways other devices can read and understand. In the case of the wireless speaker, the phone will know how to send audio files and information in a format that the speaker understands, while the speaker can interpret these signals–as well as other indicators such as volume and track controls–from the phone.…

    • 2998 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Next we would like to equip each truck with Bluetooth technology to seamlessly keep our customers connected with our drivers via phone. Our drivers are already using cellphones, however, with the current law, only Bluetooth devices are legal to use in our trucks. We are proposing purchasing Aliph Jawbone Era Bluetooth…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Ch. 16 Solutions

    • 1258 Words
    • 6 Pages

    8. If you want to upgrade your 100BaseT Ethernet network so that it will run about 10 times the current speed, what technology would you use?…

    • 1258 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Title: AS A WEAPON IN THE HANDS OF THE RESTLESS POOR , By: Shorris, Earl, Harper's Magazine, 0017789X, Sep97, Vol. 295, Issue 1768…

    • 526 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    It is estimated that Bluetooth wireless speakers alone will generate roughly $430 billion in revenue worldwide in 2014 alone (Cassagnol & Joseph, 2014). Bluetooth Technology Bluetooth technology is also found in computers and computer accessories, like mice and headsets for video games Bluetooth technology is now also found in many places in the medical field, for example in bedside telemetry monitoring equipment that remote transmits a patient’s cardiac rhythm to the monitor room and nurse’s station simultaneously in real time, alerting medical personal immediately of…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Good Essays

    contains a message in the name field ... to another Bluetooth enabled device via the…

    • 1524 Words
    • 16 Pages
    Good Essays
  • Better Essays

    Peter Singer Argument

    • 1055 Words
    • 5 Pages

    1. In this paper I will argue that Singer is wrong to claim that human suffering and animal suffering should be given equal consideration. He claims that human animals and non-human animals with vertebrae experience pain and suffering in the same way. (41)…

    • 1055 Words
    • 5 Pages
    Better Essays
  • Best Essays

    G C & E Systems Group. (2012). Security Lead Technician. Retrieved June 11, 2012, from http://www.gcesg.com/careers/sec-tech/…

    • 3587 Words
    • 15 Pages
    Best Essays
  • Good Essays

    Hardware Chapter 16

    • 1038 Words
    • 5 Pages

    8. If you want to update your 100BaseT Ethernet network so that it will run about 10 times the current speed, what technology would you use?…

    • 1038 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Goatse Security is not a security firm. This is a loose-knit, nine-person hacker group that specializes in uncovering security flaws. Its nature has been variously described as white hat, gray hat, or black hat. The group was formed in December 2009. Goatse Security derives its name from the Goatse.cx shock site. The group’s slogan is “Gaping Holes Exposed.” In 2010, it exposed vulnerabilities in the Mozilla Firefox and Apple Safari web browsers. In June 2010, Goatse Security exposed the Email addresses of 114,000 Apple iPad users. (Polom, 2010)…

    • 1694 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Task 1

    • 473 Words
    • 2 Pages

    You are the manager of the information security analyst team for a large health insurance…

    • 473 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    VOMAS

    • 2635 Words
    • 9 Pages

    One of the key issues rising from switching to wireless communication lies in security; while an air gap is among…

    • 2635 Words
    • 9 Pages
    Satisfactory Essays

Related Topics