Hi all, I'm new to this site and new to wireless hacking..however my interest in the area has led me to strat writing a research paper.
I know about certain types of attack that have been shown possible on Bluetooth devices (lets say mobile phones):
Bluejacking
A device which was once trusted but subsequently removed from the trusted list can still pair
It is possible to view and log information about phones even if they are in 'undiscoverable' mode
It is possible to creat a backdoor that will allow you to access at the very least the entire phonebook of your target without them noticing
It is posssible to tun your victims device into a roaming bug and force their phone to make calls, for example to a premium rate number (called snarfing???)
What I'd like to hear your opinion on is whether each of these atacks has been addressed adequately. I.E. wil there be imminent hardware or software fixes for them by either the Bluetooth SIG (e.g. in the next version of the protocol), or by the phone manufacters?
The reason I ask is so that I can pick the attack which is least likely to be fixed in the near future, and then try to fix it myself!! This will be the basis of my research paper.
Also any opinions on which is the most dangerous attack, and if there are any other types of attack I havent listed would be great
Your responses will be very much appreciated :)
-Alex
I know about certain types of attack that have been shown possible on Bluetooth devices (lets say mobile phones):
Bluejacking
A device which was once trusted but subsequently removed from the trusted list can still pair
It is possible to view and log information about phones even if they are in 'undiscoverable' mode
It is possible to creat a backdoor that will allow you to access at the very least the entire phonebook of your target without them noticing
It is posssible to tun your victims device into a roaming bug and force their phone to make calls, for example to a premium rate number (called snarfing???)
What I'd like to hear your opinion on is whether each of these atacks has been addressed adequately. I.E. wil there be imminent hardware or software fixes for them by either the Bluetooth SIG (e.g. in the next version of the protocol), or by the phone manufacters?
The reason I ask is so that I can pick the attack which is least likely to be fixed in the near future, and then try to fix it myself!! This will be the basis of my research paper.
Also any opinions on which is the most dangerous attack, and if there are any other types of attack I havent listed would be great
Your responses will be very much appreciated :)
-Alex
Comment