SlideShare una empresa de Scribd logo
1 de 27
Bluetooth Vulnerabilities

     ECE 478 Winter 05
        Victor Yee
Topics
•   What is Bluetooth?      •   Eavesdropping
•   History                 •   Impersonation
•   SIG
                            •   Cipher Vulnerabilities
•   Modes
•   Address
                            •   Bluejacking
•   Pairing                 •   Bluesnarfing
                            •   Bluetooone
                            •   Bluesniper
What is Bluetooth?
• Wirelessly connect to
  –   Wireless headsets
  –   Handhelds
  –   Personal computers
  –   Printers
  –   Mobile phones
  –   Digital cameras
  –   GPS receivers
  –   Digital pens
  –   Automobiles
What is Bluetooth?
• Short-range (10m-100m) wireless specification
• Operating at 2.4GHz radio spectrum
• Allows up to 7 simultaneous connections
  maintained by a signal radio.
• Data transfers at least 2Mb/s
History
• Named from Danish King Harold Bluetooth from
  the 10th century
  – instrumental in uniting warring factions that is now
    Norway, Sweden, and Denmark
• The logo was designed by a Scandinavian firm
  in which the runic character H & B were used
SIG
• Bluetooth Special Interest Group
  – Privately held trade associations made up of leaders
     •   Telecom
     •   Computing
     •   Automotive
     •   Industrial automation
     •   Network industries.
  – They are marketing and advancing the development
    of the technology
Bluetooth Protocol Stack
• L2CAP - Logical Link Control and Adaptation
  Protocol
• OBEX - Generalized Multi-Transport Object
  Exchange Protocol
• RFCOMM - Serial Port Emulation
• SDP - Service Discovery Protocol
• TCS - Telephony Control protocol Specification
Modes
• Bluetooth devices can be in different modes
  – Discoverable
     • Device can be found by others searching in range
  – Connectable
     • Respond to messages from connected devices
  – Non-Discoverable
  – Non-Connectable
Address
• Bluetooth device address (MAC)
  – Unique identifier for the device for all communication
  – Device Access Code (DAC) is used to address the
    device
  – Channel Access Code (CAC) is used to identify the
    channel
  – DAC & CAC
     • Determined by device address
     • Not encrypted
Address
• Unique Address
  – Track and monitor behavior of user
  – Logs = Violation of privacy
Security Modes
• Mode 1
  – No Security
• Mode 2
  – Application/Service
    based (L2CAP)
• Mode 3
  – Link-Layer
     • PIN Authentication
     • Address Security
     • encryption
Security Modes
• Difference between Mode 2 and Mode 3
  – Bluetooth device initiates security procedures before
    the channel is established during Mode 3
Security Modes
• Different security Modes for devices and
  services
  – Devices (2 Levels)
     • Trusted Device – unrestricted access to all services
     • Untrusted Device
  – Services (3 Levels)
     • Require authorization and authentication
     • Require authentication only
     • Open to all devices
How does Pairing Work?
• Two Bluetooth devices need to pair up before
  data can be exchanged.
• PIN consisting of numeric digits from 0-9 is
  established
• Device sends a random number to the other
  device.
• Both devices compute the initiation key based
  on a function of the shared PIN, Bluetooth
  device address that received the random
  number, and the random number.
PIN
• 0000 is default
   – 50% of used PINs are 0000 (Laziness)
• 4 digits
   – 10,000 Possibilities
Verification
• Other device responds the computed
  computation back to the first device
• First device compares the received value to its
  computed value if they are the same
• Then the roles switch
Eavesdropping
• Attacker is able to listen to messages or data
  exchanged between devices.
  – No application layer encryption
  – Middle-person attack
• Voice data between phone and headset
• Obtain credit card information (Internet
  purchases)
• Exhaustively guesses all PIN up to a certain
  length
Impersonation
• If PIN is known, Attacker is able to impersonate
  – Alter email responses (Internet Access)
  – Data to be printed (Printer)
Cipher Vulnerabilities
• 128 bit key can be broken in 2^64
• Divide-and-conquer attacks are not
  possible
  – Need access to key stream over long periods
  – Bluetooth has high resynchronization
    frequencies
Bluejacking
• Sending anonymous messages to another
  device without approval or authorization
• Example
  – Tourists admirers Swedish handicrafts in a storefront
    window, cell phone chirped with an anonymous note:
    quot;Try the blue sweaters. They keep you warm in the
    winter.quot;

    Tourist is oblivious to who the sender is.
Bluesnarfing
• Snarf is network slang for unauthorized copy
• Theft of Data, Calendar Information, Phonebook
  Contacts, Phone’s IMEI
  – Stolen IMEI can be used for cloning a phone
• Attacker establishes connection without
  confirmation
• Cell phones vulnerable to privacy invasion
• Devices can be purchased on the Internet
• Attackers exploit a flaw through OBEX Protocol
  using a PUSH Channel attack
BlueBug
• Based on AT Commands
• Gives the attacker high levels of control to mobile
  phones
   –   Phone calls
   –   Text Messages (SMS)
   –   Phonebook entries (Reading/Writing)
   –   Call Forwards
• Flaw on the RFCOMM channels
   – Not announced over the Service Discovery Protocol (SDP)
   – RFCOMM protocol provides emulation of serial ports over the
     L2CAP protocol
Bluetooone
• Increasing the range
  by attaching a
  directional antenna
• Long Range attacks
• Not limited to 100
  meters distance
Bluesniper
• Tested at 1.1 miles in
  2004
Other Flaws
• Battery draining denial of service attack
  – Occupies channel
  – Drain battery from continuous scanning
Protection?
•   Turn off Bluetooth when not in use
•   Set to Non-Discoverable
•   Choose Random PIN numbers (16 Octets)
•   Confidential and Sensitive information should
    not be transmitted
Sources
•   Bluetooth.com
•   Bluetooth.org
•   Bluetooth Protocol Stack. thewirelessdirectory.com
•   Ellie, Jelly (2004). Why ‘bluejacking’? Bluejackq.com
•   Jakobsson, Markus. Security Weaknesses in Bluetooth. Lucent
          Technologies.
•   Laurie, Adam. (2003). Bluetooth Hacking – Full Disclosure.
          trifinite.org.
•   Laurie, Ben (2004). Bluetooth Security Briefs. thebunker.net
•   Vainio, Juha (2000). Bluetooth Security. Helsinki Univ.
•   Whitehouse, Ollie (2003). War Nibbling: Bluetooth Insecurity.
          @stake Research Report.

Más contenido relacionado

La actualidad más candente

A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
Abhiram Subhagan
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 

La actualidad más candente (20)

Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Ip tables
Ip tablesIp tables
Ip tables
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 
Distance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Combined PresentationDistance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
OSI layer by cisco
OSI layer by ciscoOSI layer by cisco
OSI layer by cisco
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Mpls basic
Mpls basicMpls basic
Mpls basic
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Routing Information Protocol (RIP)
Routing Information Protocol (RIP)
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
middleware
middlewaremiddleware
middleware
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 

Destacado (12)

Control system (II-ECE)
Control system (II-ECE)Control system (II-ECE)
Control system (II-ECE)
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Carwhisperer Bluetooth Attack
Carwhisperer Bluetooth AttackCarwhisperer Bluetooth Attack
Carwhisperer Bluetooth Attack
 
Sku Brochure
Sku BrochureSku Brochure
Sku Brochure
 
Disaster management modified
Disaster management modifiedDisaster management modified
Disaster management modified
 
Hijacking bluetooth headsets
Hijacking bluetooth headsetsHijacking bluetooth headsets
Hijacking bluetooth headsets
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
STREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENT
STREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENTSTREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENT
STREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENT
 
Automatic irrigation 1st review(ieee project ece dept)
Automatic irrigation 1st review(ieee project ece dept)Automatic irrigation 1st review(ieee project ece dept)
Automatic irrigation 1st review(ieee project ece dept)
 
Automatic irrigation system ppt
Automatic irrigation system pptAutomatic irrigation system ppt
Automatic irrigation system ppt
 
wimax Ppt for seminar
wimax Ppt for seminarwimax Ppt for seminar
wimax Ppt for seminar
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 

Similar a Bluetooth Vulnerabilities

HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
AdaCore
 
Don Bailey - A Million Little Tracking Devices
Don Bailey  - A Million Little Tracking DevicesDon Bailey  - A Million Little Tracking Devices
Don Bailey - A Million Little Tracking Devices
Source Conference
 
Group1 Ss08 Smartphones
Group1 Ss08 SmartphonesGroup1 Ss08 Smartphones
Group1 Ss08 Smartphones
Kalun Leung
 

Similar a Bluetooth Vulnerabilities (20)

Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
THAT_2023_BLE.pdf
THAT_2023_BLE.pdfTHAT_2023_BLE.pdf
THAT_2023_BLE.pdf
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth1
Bluetooth1Bluetooth1
Bluetooth1
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.ppt
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 
Don Bailey - A Million Little Tracking Devices
Don Bailey  - A Million Little Tracking DevicesDon Bailey  - A Million Little Tracking Devices
Don Bailey - A Million Little Tracking Devices
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
 
Android Gadgets, Bluetooth Low Energy, and the WunderBar
Android Gadgets, Bluetooth Low Energy, and the WunderBarAndroid Gadgets, Bluetooth Low Energy, and the WunderBar
Android Gadgets, Bluetooth Low Energy, and the WunderBar
 
Group1 Ss08 Smartphones
Group1 Ss08 SmartphonesGroup1 Ss08 Smartphones
Group1 Ss08 Smartphones
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Bluetooth Vulnerabilities

  • 1. Bluetooth Vulnerabilities ECE 478 Winter 05 Victor Yee
  • 2. Topics • What is Bluetooth? • Eavesdropping • History • Impersonation • SIG • Cipher Vulnerabilities • Modes • Address • Bluejacking • Pairing • Bluesnarfing • Bluetooone • Bluesniper
  • 3. What is Bluetooth? • Wirelessly connect to – Wireless headsets – Handhelds – Personal computers – Printers – Mobile phones – Digital cameras – GPS receivers – Digital pens – Automobiles
  • 4. What is Bluetooth? • Short-range (10m-100m) wireless specification • Operating at 2.4GHz radio spectrum • Allows up to 7 simultaneous connections maintained by a signal radio. • Data transfers at least 2Mb/s
  • 5. History • Named from Danish King Harold Bluetooth from the 10th century – instrumental in uniting warring factions that is now Norway, Sweden, and Denmark • The logo was designed by a Scandinavian firm in which the runic character H & B were used
  • 6. SIG • Bluetooth Special Interest Group – Privately held trade associations made up of leaders • Telecom • Computing • Automotive • Industrial automation • Network industries. – They are marketing and advancing the development of the technology
  • 7. Bluetooth Protocol Stack • L2CAP - Logical Link Control and Adaptation Protocol • OBEX - Generalized Multi-Transport Object Exchange Protocol • RFCOMM - Serial Port Emulation • SDP - Service Discovery Protocol • TCS - Telephony Control protocol Specification
  • 8. Modes • Bluetooth devices can be in different modes – Discoverable • Device can be found by others searching in range – Connectable • Respond to messages from connected devices – Non-Discoverable – Non-Connectable
  • 9. Address • Bluetooth device address (MAC) – Unique identifier for the device for all communication – Device Access Code (DAC) is used to address the device – Channel Access Code (CAC) is used to identify the channel – DAC & CAC • Determined by device address • Not encrypted
  • 10. Address • Unique Address – Track and monitor behavior of user – Logs = Violation of privacy
  • 11. Security Modes • Mode 1 – No Security • Mode 2 – Application/Service based (L2CAP) • Mode 3 – Link-Layer • PIN Authentication • Address Security • encryption
  • 12. Security Modes • Difference between Mode 2 and Mode 3 – Bluetooth device initiates security procedures before the channel is established during Mode 3
  • 13. Security Modes • Different security Modes for devices and services – Devices (2 Levels) • Trusted Device – unrestricted access to all services • Untrusted Device – Services (3 Levels) • Require authorization and authentication • Require authentication only • Open to all devices
  • 14. How does Pairing Work? • Two Bluetooth devices need to pair up before data can be exchanged. • PIN consisting of numeric digits from 0-9 is established • Device sends a random number to the other device. • Both devices compute the initiation key based on a function of the shared PIN, Bluetooth device address that received the random number, and the random number.
  • 15. PIN • 0000 is default – 50% of used PINs are 0000 (Laziness) • 4 digits – 10,000 Possibilities
  • 16. Verification • Other device responds the computed computation back to the first device • First device compares the received value to its computed value if they are the same • Then the roles switch
  • 17. Eavesdropping • Attacker is able to listen to messages or data exchanged between devices. – No application layer encryption – Middle-person attack • Voice data between phone and headset • Obtain credit card information (Internet purchases) • Exhaustively guesses all PIN up to a certain length
  • 18. Impersonation • If PIN is known, Attacker is able to impersonate – Alter email responses (Internet Access) – Data to be printed (Printer)
  • 19. Cipher Vulnerabilities • 128 bit key can be broken in 2^64 • Divide-and-conquer attacks are not possible – Need access to key stream over long periods – Bluetooth has high resynchronization frequencies
  • 20. Bluejacking • Sending anonymous messages to another device without approval or authorization • Example – Tourists admirers Swedish handicrafts in a storefront window, cell phone chirped with an anonymous note: quot;Try the blue sweaters. They keep you warm in the winter.quot; Tourist is oblivious to who the sender is.
  • 21. Bluesnarfing • Snarf is network slang for unauthorized copy • Theft of Data, Calendar Information, Phonebook Contacts, Phone’s IMEI – Stolen IMEI can be used for cloning a phone • Attacker establishes connection without confirmation • Cell phones vulnerable to privacy invasion • Devices can be purchased on the Internet • Attackers exploit a flaw through OBEX Protocol using a PUSH Channel attack
  • 22. BlueBug • Based on AT Commands • Gives the attacker high levels of control to mobile phones – Phone calls – Text Messages (SMS) – Phonebook entries (Reading/Writing) – Call Forwards • Flaw on the RFCOMM channels – Not announced over the Service Discovery Protocol (SDP) – RFCOMM protocol provides emulation of serial ports over the L2CAP protocol
  • 23. Bluetooone • Increasing the range by attaching a directional antenna • Long Range attacks • Not limited to 100 meters distance
  • 24. Bluesniper • Tested at 1.1 miles in 2004
  • 25. Other Flaws • Battery draining denial of service attack – Occupies channel – Drain battery from continuous scanning
  • 26. Protection? • Turn off Bluetooth when not in use • Set to Non-Discoverable • Choose Random PIN numbers (16 Octets) • Confidential and Sensitive information should not be transmitted
  • 27. Sources • Bluetooth.com • Bluetooth.org • Bluetooth Protocol Stack. thewirelessdirectory.com • Ellie, Jelly (2004). Why ‘bluejacking’? Bluejackq.com • Jakobsson, Markus. Security Weaknesses in Bluetooth. Lucent Technologies. • Laurie, Adam. (2003). Bluetooth Hacking – Full Disclosure. trifinite.org. • Laurie, Ben (2004). Bluetooth Security Briefs. thebunker.net • Vainio, Juha (2000). Bluetooth Security. Helsinki Univ. • Whitehouse, Ollie (2003). War Nibbling: Bluetooth Insecurity. @stake Research Report.