Académique Documents
Professionnel Documents
Culture Documents
Harshil Shah
New York Institute of Technology
hshah31@nyit.edu
Abstract
This paper briefly describes the
protocol architecture of
Bluetooth, different kinds of
attack on Bluetooth enabled
devices and mitigation
techniques. Several types of
attacks are described.
Keywords
Bluetooth, Bluetooth hacking,
bluesnarfer, bluejacking, bluesniping
Introduction
Bluetooth is one of the wireless
technologies which are widely used
these days. Bluetooth is standard
communication protocol for short
range communications. Bluetooth
operates in the range of 2.4GHz.
Cellphones, computers, PDAs and
headsets are a few devices that
commonly use Bluetooth for
synchronizing email, playing music,
sending phone data. Bluehacking,
bluejacking, bluesnarfing and
bluesnafting are attacks that can be
done over Bluetooth.
Bluetooth Protocols
L2CAP: It is used to multiplex multiple
logical connections between two
devices using different higher level
protocols.
Type of Attacks
There are different kinds of attacks
that can be employed against
Bluetooth devices like blujacking,
bluesnarfing, bluebugging,
bluelogging, bluedumping and car
whisperer.
One should note that
Bluetooth range is limited from 10m to
100m. So attacker needs to be in
range of the Bluetooth device.
Some of the common attacks on
Bluetooth devices are mentioned here.
Bluebugging: Bluebugging is
powerful attack mechanism, which
takes control of the target phone and
allows attacker to make calls, send
text messages, read messages and
accessing and modifying phonebook. It
also allows an attacker to connect to
internet, forwarding a call and much
more.
Project Discoveries:
Using different tools, information
about target Bluetooth device can be
gathered. Here in this project, tools
like bluesnarfer, btscanner and
blumaho are used.
Bluesnarfer
To use bluesnarfer we need to create
specific environment.
Bluesnarfer Commands
Bluemanho
Sdptools
Using sdptools we can get
Service Name
Service RecHandle
Conclusion:
Information gathering of the
Bluetooth enabled devices is
easy.
Android and Apple devices are
not vulnerable to Bluetooth
hack because of secure
authentication system.
References:
1. JOHNNY CACHE, JOSHUA
WRIGHT, VINCENT LIU. Hacking
Additional Wireless
Technologies Hacking Exposed
Wireless: Wireless Security
Secrets & Solutions, 2nd ed.
2. Dennis Browning, Gary C.
Kessler. Bluetooth Hacking: A
Case Study. ADFSL Conference
on Digital Forensics, Security
and Law, 2009
3. Bluetooth (2015, May 04).
Wikipedia. Retrieved from
http://en.wikipedia.org/wiki/Blue
tooth
4. Bluetooth Core Specification
Addendum 1
5. Amit Saini, Akansha Marwah.
Amateurs Hack System
Professionals Hack Cars
6. Sil Janssens. Preliminary study:
BLUETOOTH SECURITY
7. Jing Su, Kelvin K. W. Chan,
Andrew G. Miklas, Kenneth Po,
Ali Akhavan, Stefan Saroiu, Eyal
de Lara, Ashvin Goel. A
Preliminary Investigation of
Worm Infections in a Bluetooth
Environment
8. John Padgette, Karen Scarfone,
Lily Chen. Guide to Bluetooth
Security, Recommendations of
the National Institute of
Standards and Technology
9. http://www.backtracklinux.org/forums/showthread.ph
p?t=5637
10.http://mirror.opennmsedu.net/pub/ftp.ccc.de/pub/cong
ress/2004/papers/066%20Bluet
ooth%20Hacking.pdf
11.http://hackyogi.com/top-5bluetooth-hacking-tools/