From the course: CompTIA Security+ (SY0-701) Cert Prep

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Understanding Bluetooth attacks

Understanding Bluetooth attacks

- [Instructor] Bluetooth is a common short range communication technology, and most people are familiar with the use of Bluetooth to connect smartphones to car audio systems, external speakers and headsets. Bluetooth communications are very useful, but they can also be a source of security vulnerabilities. Bluejacking attacks occur when attackers use Bluetooth technology to send spam messages directly to a device. Typically, they try to convince the user to visit a website or take some other action that will lead to a more advanced attack. The reality is that bluejacking attacks are mostly a dated concept and they're rarely seen today. Bluesnarfing attacks were possible in older implementations of Bluetooth. Attackers were able to force pairing between a victim device and their own, and then use that pairing to pull down, or snarf, contacts and other information from the device. The attacker could also monitor communications on the device. You see the forced pairing attacks of…

Contents