Bluetooth is a short-range radio technology aimed at simplifying communications among Internet devices, between Bluetooth enabled devices and the Internet. It also aims to simplify data synchronization between Internet devices and other computers. Hackers have found many flaws with Bluetooth devices. As these devices gain in popularity, the public needs to be made aware of vulnerability issues with the various Bluetooth devices such as phones, PDAs and wireless headsets. Three of the most interesting attacks were Bluesnarfing, Bluetracking and Bluebugging.
- Bluesnarfing is attacking the Bluetooth device, usually a phone, to rip out information. Hackers can obtain phonebooks, calendars and stored SMS messages.
- Bluetracking is tracking a person's movement by tracking their Bluetooth device. All Bluetooth devices have a unique address, similar to a MAC address on computer network cards. By using special sensors or antennas you can see where a particular Bluetooth device pops up and record a person's movement.
- Bluebugging involves sending executable commands to the Bluetooth device. With the proper software, you could secretly turn on a phone and make it call you. Why is this important? You have just turned the phone into a listening device that can record without your target knowing it.
The Flexilis teams demonstrated the gun with some home-brewed Bluetooth scanning software. They pointed the gun down the hallways and out windows. Almost instantly, vulnerable phones with their unique Bluetooth device numbers appeared on the laptop screen. The device is powerful enough to detect devices through building walls!
No comments:
Post a Comment