Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
&
Hacks
Presented by-
Sandeep kumar
Electrical engg.(2nd year,4th sem)
Roll no.-36
gbpec
contents
Introduction
Bluetooth Basics
Bluetooth Services
Bluetooth Profiles
Trusted Devices
Bluetooth Security
Attacks against Bluetooth - Introduction
Attacker’s Tools
BlueSnarf
BlueSnarf++
BlueBug
BlueJacking
HeloMoto
BlueSmack
Cracking the Bluetooth PIN
Conclusion on Bluetooth Security
introduction
Version 2.0+EDR 3
3 1 mW (0 dBm) ca. 10 m
For a secure communication via
Bluetooth, the following security targets
are defined:
confidentiality
(device) authentication
(device) authorisation
integrity
In order to accomplish those security targets, three
possible modes of security are defined:-
BackTrack, a Slax-
based Linux
distribution
[bac07], available
as a live-cd goes
one step further,
providing several
more complex
automated attacks
on Bluetooth Figure : BackTrack livecd with fluxbox interface
devices.
BTcrack
BTCrack
has been published at 23C3, a
German hacker congress.