Originally posted by xanderd
Announcement
Collapse
No announcement yet.
Have Bluetooth threats been properly addressed?
Collapse
X
-
Originally posted by allentraceWhat is with you and the posts and threads with bluetooth, dear god is it some sort of fetish with you. Their is no such things as safe in this fucked up world so why the fuck do you persist in asking relative questions. Tell you what go work for on of the cellular companies specifically with their bluetooth implementation and in 10 years come back and tells us whether or not you have fixed all the problems but until then, Google is your friend.
I think I was very polite in asking a pertinent question in an appropriate place. However, I think your answer was rude, grammatically poor, and defeatistic in nature.
I a researcher in Bluetooth security so asking these sorts of questions is a necessary part of research.
The world will never become any safer if we dont continually strive to keep up to date and defend against the latest attacks.
Leave a comment:
-
Originally posted by xanderdHi all, I'm new to this site and new to wireless hacking..however my interest in the area has led me to strat writing a research paper.
I know about certain types of attack that have been shown possible on Bluetooth devices (lets say mobile phones):
Bluejacking
A device which was once trusted but subsequently removed from the trusted list can still pair
It is possible to view and log information about phones even if they are in 'undiscoverable' mode
It is possible to creat a backdoor that will allow you to access at the very least the entire phonebook of your target without them noticing
It is posssible to tun your victims device into a roaming bug and force their phone to make calls, for example to a premium rate number (called snarfing???)
What I'd like to hear your opinion on is whether each of these atacks has been addressed adequately. I.E. wil there be imminent hardware or software fixes for them by either the Bluetooth SIG (e.g. in the next version of the protocol), or by the phone manufacters?
The reason I ask is so that I can pick the attack which is least likely to be fixed in the near future, and then try to fix it myself!! This will be the basis of my research paper.
Also any opinions on which is the most dangerous attack, and if there are any other types of attack I havent listed would be great
Your responses will be very much appreciated :)
-Alex
Leave a comment:
-
No they have not even attempted to fix any of the bluetooth cellphone vaunerabilities. Verison refuses to even acknowledge it.
Leave a comment:
-
Search these Forums on "bluetooth" and you'll get at least 27 threads, most of which discuss BT vunerablities and varying detail. Opinions are given in several of them about the various vunerablities and which are the most dangerous.
Then hit Google, and start with these terms:
bluejack (ing)
bluejaq (ing)
bluesnarf (ing)
bluedriving
toothing
redfang
shmoo group
Leave a comment:
-
Have Bluetooth threats been properly addressed?
Hi all, I'm new to this site and new to wireless hacking..however my interest in the area has led me to strat writing a research paper.
I know about certain types of attack that have been shown possible on Bluetooth devices (lets say mobile phones):
Bluejacking
A device which was once trusted but subsequently removed from the trusted list can still pair
It is possible to view and log information about phones even if they are in 'undiscoverable' mode
It is possible to creat a backdoor that will allow you to access at the very least the entire phonebook of your target without them noticing
It is posssible to tun your victims device into a roaming bug and force their phone to make calls, for example to a premium rate number (called snarfing???)
What I'd like to hear your opinion on is whether each of these atacks has been addressed adequately. I.E. wil there be imminent hardware or software fixes for them by either the Bluetooth SIG (e.g. in the next version of the protocol), or by the phone manufacters?
The reason I ask is so that I can pick the attack which is least likely to be fixed in the near future, and then try to fix it myself!! This will be the basis of my research paper.
Also any opinions on which is the most dangerous attack, and if there are any other types of attack I havent listed would be great
Your responses will be very much appreciated :)
-AlexTags: None
Leave a comment: