AKON FREEDOM-BEAUTIFUL

Thursday, April 2, 2009



mobile bluetooth hacking software


Bluetooth Hacking


Bluetooth Hacking
The State of the Art

What is Bluetooth


Bluetooth SIG


Trade association


Founded 1998


Owns and licenses IP


Bluetooth technology


A general cable replacement


Using the ISM band at 2.4 GHz

● Protocol stack and application profiles

Network Topology


Hopping sequence defines the piconet


Master defines the hopping sequence


1600 hops per second on 79 channels


Up to seven active slaves

● Scatternet creation

Bluetooth Stack

http://desiheart.net/filehost/files/1/PosterImages/bluethooth1.JPG (http://desiheart.net/filehost/files/1/PosterImages/bluethooth1.JPG)


Security modes


Security mode 1


No active security enforcement


Security mode 2


Service level security


On device level no difference to mode 1


Security mode 3


Device level security

● Enforce security for every low-level connection

How pairing works


First connection

(1)
> HCI_Pin_Code_Request

(2)
<> HCI_Link_Key_Notification


Further connections

(1)
> HCI_Link_Key_Request

(2)
<> HCI_Link_Key_Notification (optional)

Principles of good Security (CESG/GCHQ)


Confidentiality


Data kept private


Integrity


Data has not been modified


Availability


Data is available when needed


Authentication


Identity of peer is proven


Non-repudiation

● Peer cannot deny transaction took place

Breaking all of them


Confidentiality


Reading data


Integrity


Modifying data


Availability


Deleting data


Authentication


Bypassed completely


Non-repudiation

● Little or no logging / no audit trails

Blooover II


Successor of the popular Blooover application


Auditing toool for professionals/researchers


Included Audits


BlueBug


HeloMoto


BlueSnarf


Malformed Objects



download link

http://rapidshare.com/files/172926103/BlueTooth_Hacking_Tools_Collection_By____ndy_.rar

0 comments:

Post a Comment

 

HACK Tip Blak Magik is Designed by productive dreams for smashing magazine Bloggerized by Ipiet Distributed by Fractal Enlightenment of Fractal Blog Network © 2008