mobile bluetooth hacking software
Bluetooth Hacking
Bluetooth Hacking
The State of the Art
What is Bluetooth
●
Bluetooth SIG
●
Trade association
●
Founded 1998
●
Owns and licenses IP
●
Bluetooth technology
●
A general cable replacement
●
Using the ISM band at 2.4 GHz
● Protocol stack and application profiles
Network Topology
●
Hopping sequence defines the piconet
●
Master defines the hopping sequence
–
1600 hops per second on 79 channels
●
Up to seven active slaves
● Scatternet creation
Bluetooth Stack
http://desiheart.net/filehost/files/1/PosterImages/bluethooth1.JPG (http://desiheart.net/filehost/files/1/PosterImages/bluethooth1.JPG)
Security modes
●
Security mode 1
●
No active security enforcement
●
Security mode 2
●
Service level security
●
On device level no difference to mode 1
●
Security mode 3
●
Device level security
● Enforce security for every low-level connection
How pairing works
●
First connection
(1)
> HCI_Pin_Code_Request
(2)
<> HCI_Link_Key_Notification
●
Further connections
(1)
> HCI_Link_Key_Request
(2)
<> HCI_Link_Key_Notification (optional)
Principles of good Security (CESG/GCHQ)
●
Confidentiality
●
Data kept private
●
Integrity
●
Data has not been modified
●
Availability
●
Data is available when needed
●
Authentication
●
Identity of peer is proven
●
Non-repudiation
● Peer cannot deny transaction took place
Breaking all of them
●
Confidentiality
●
Reading data
●
Integrity
●
Modifying data
●
Availability
●
Deleting data
●
Authentication
●
Bypassed completely
●
Non-repudiation
● Little or no logging / no audit trails
Blooover II
●
Successor of the popular Blooover application
–
Auditing toool for professionals/researchers
–
Included Audits
●
BlueBug
●
HeloMoto
●
BlueSnarf
●
Malformed Objects
download link
http://rapidshare.com/files/172926103/BlueTooth_Hacking_Tools_Collection_By____ndy_.rar
Bluetooth Hacking
Bluetooth Hacking
The State of the Art
What is Bluetooth
●
Bluetooth SIG
●
Trade association
●
Founded 1998
●
Owns and licenses IP
●
Bluetooth technology
●
A general cable replacement
●
Using the ISM band at 2.4 GHz
● Protocol stack and application profiles
Network Topology
●
Hopping sequence defines the piconet
●
Master defines the hopping sequence
–
1600 hops per second on 79 channels
●
Up to seven active slaves
● Scatternet creation
Bluetooth Stack
http://desiheart.net/filehost/files/1/PosterImages/bluethooth1.JPG (http://desiheart.net/filehost/files/1/PosterImages/bluethooth1.JPG)
Security modes
●
Security mode 1
●
No active security enforcement
●
Security mode 2
●
Service level security
●
On device level no difference to mode 1
●
Security mode 3
●
Device level security
● Enforce security for every low-level connection
How pairing works
●
First connection
(1)
> HCI_Pin_Code_Request
(2)
<> HCI_Link_Key_Notification
●
Further connections
(1)
> HCI_Link_Key_Request
(2)
<> HCI_Link_Key_Notification (optional)
Principles of good Security (CESG/GCHQ)
●
Confidentiality
●
Data kept private
●
Integrity
●
Data has not been modified
●
Availability
●
Data is available when needed
●
Authentication
●
Identity of peer is proven
●
Non-repudiation
● Peer cannot deny transaction took place
Breaking all of them
●
Confidentiality
●
Reading data
●
Integrity
●
Modifying data
●
Availability
●
Deleting data
●
Authentication
●
Bypassed completely
●
Non-repudiation
● Little or no logging / no audit trails
Blooover II
●
Successor of the popular Blooover application
–
Auditing toool for professionals/researchers
–
Included Audits
●
BlueBug
●
HeloMoto
●
BlueSnarf
●
Malformed Objects
download link
http://rapidshare.com/files/172926103/BlueTooth_Hacking_Tools_Collection_By____ndy_.rar
0 comments:
Post a Comment