SlideShare a Scribd company logo
5
Most read
12
Most read
15
Most read
Seminar on  Blue tooth Hacking   [security and threats] By-  Dhanashree Waikar Roll No – 3379 Project Guide – Prof. N. R. Talhar
Overview Introduction Bluejack attack Bluespamming The Bluesnarf attack The Bluebug attack Helomoto Crack pin code Blueprinting Other attacks [Trojans, Viruses, worms] Security levels Countermeasures
Bluetooth introduction Wireless networking technology For short range devices Speed-2.4Ghz  Range is between 10 to 30m Data transfer rate is 1mbps Bluetooth SIG Founded in 1998 Trade association Owns and licenses IP
Bluejack   OBEX push attack Object exchange protocol for exchanging data with one another (data like files, picture, business cards, calendar entries etc.) Commonly send ‘business card’ with message via OBEX Variants Bluetoothing Bluechatting Modifying a remote mobile phone’s address book Bluespamming
BlueSnarf Attack  Discovered by Marcel Holtmann Published in October 2003 BlueSnarf exploits weak OBEX implementation on mobile phones OBEX pull attack Attacker involves the use of the OBEX protocol to forcibly pull sensitive data out of the victim’s mobile phone  Extreme vulnerableand damage possible through bluesnarfing
BlueSnarf Attack  continued …   Can steal sensitive data without the knowledge of the victim  Address book, Photographs, Music, videos, calendar,  IMEI, noReading/decoding sms messages etc.  Adv connects to OBEX push profile No authentication, no pairing needed -> invisible connection
Bluebug  Discovered by Martin Herfurt Public field test - CeBIT 2004 Full access to AT command set hence  Full phone control  Based on AT Commands -> not OBEX  Typical use cases : - Call control (turning phone into bug)  Initiating a new call to predefined no.
Helomoto  Bluesnarf + Bluebug Requires entry in 'Device History' OBEX PUSH to create entry Connect RFCOMM to Hands free or Headset No Authentication required Full AT command set access
Pairing  When two devices first meet, they “pair” Slave must have knowledge of BD_ADDR through inquiry or user input Pairing information recorded, may contain authentication credentials Inquiry mode no longer necessary since BD_ADDR is recorded on slave
Creation of k_init Creation of k_init
Creation of k_ab Creation of k_ab
Mutual authentication Mutual authentication
The Basic Attack List of messages sent during pairing and authentication process
The Basic Attack Structure The Basic Attack Structure
Blueprinting  Used for generating statistics about manufacturers and models  Bluetooth device address->format->MM:MM:MM:XX:XX:XX Whether there are devices in range that have issues with Bluetooth security  Used to get knowledge of different models that can be affected Use service discovery protocol (SDP) Attacker   sends problem    Bluetooth device   Bluetooth device   sends back hash   attacker
Virus Worms and Trojans  Viruses do not have the capability to spread and infect devices on their own.  Even worms are malicious files that cause harm to the target device.  Trojans are malicious files that can be used for carrying out harmful activities on the target device.
Security  A device can implement three different security modes: Nonsecure: A device will not initiate any security measures, so communication takes place without authentication or encryption. Service-level enforced security: Two devices can establish an ACL link in a nonsecure manner. Security procedures are initiated when a L2CAP (Logical Link Control and Adaptation Protocol) channel request is made. Link-level enforced security: Security procedures are initiated when the ACL link is being established.
Countermeasures  One should not enable Bluetooth unless it is necessary. One should not accept files or business cards or any other incoming Bluetooth data from unknown people. Avoid using short pairing codes. Change the default name
Any Questions?
Thank you

More Related Content

PPT
Bluejacking by Niharika Mundra
PPTX
Bluejacking
PPT
Umts(3g)
PPT
IDS and IPS
PDF
Wireless Networking Security
PPTX
Wireless and mobile security
PPTX
Intrusion detection
 
PPTX
Cyber kill chain
Bluejacking by Niharika Mundra
Bluejacking
Umts(3g)
IDS and IPS
Wireless Networking Security
Wireless and mobile security
Intrusion detection
 
Cyber kill chain

What's hot (20)

PDF
What is Network Security?
PPT
Attacks in MANET
PDF
LTE :Mobile Network Security
PPTX
IoT - Attacks and Solutions
PPT
Internet Traffic Monitoring and Analysis
PDF
Network Security Presentation
PPT
IoT security (Internet of Things)
PPT
Wifi Security
PDF
Attacking GRX - GPRS Roaming eXchange
PPT
bluetooth-security
PPTX
Bluejacking sadhana
PPTX
Bluejacking
PPTX
Windows firewall
PPT
Mobile forensics
PPTX
Cellular technologies and security
PPTX
WPA 3
PDF
HTTP & HTML & Web
DOCX
Protocols in Bluetooth
PPTX
Wireless network
What is Network Security?
Attacks in MANET
LTE :Mobile Network Security
IoT - Attacks and Solutions
Internet Traffic Monitoring and Analysis
Network Security Presentation
IoT security (Internet of Things)
Wifi Security
Attacking GRX - GPRS Roaming eXchange
bluetooth-security
Bluejacking sadhana
Bluejacking
Windows firewall
Mobile forensics
Cellular technologies and security
WPA 3
HTTP & HTML & Web
Protocols in Bluetooth
Wireless network

Viewers also liked (8)

PPTX
Bluetooth
PPT
Socket Programming Tutorial
PPT
Bluetooth Technology
PPT
Bluetooth Slides
PPT
Bluetooth technology presentation
PPTX
Bluetooth Presentation
PPSX
Wi-Fi technology presentation
PPTX
Wi-Fi Technology
Bluetooth
Socket Programming Tutorial
Bluetooth Technology
Bluetooth Slides
Bluetooth technology presentation
Bluetooth Presentation
Wi-Fi technology presentation
Wi-Fi Technology

Similar to Bluetooth Hacking (20)

PDF
amrapali builders@@@bluetooth hacking.pdf
PDF
Security threats analysis in bluetooth enabled mobile devices
PPT
INTRODUCTION TO BLUETOOTH HACKING (An0n Ali).ppt
PPTX
Bluetooth network-security-seminar-report
PPT
A Comprehensive Approach to Secure Group Communication in Wireless Networks
PPTX
IoT setup and pairing
PPTX
Blue jacking
PPTX
Bluejacking ppt.pptx\Bluejacking is used for sending unauthorized messages to...
PPT
Net Defender
PDF
V3I6-0108
PDF
Ce hv6 module 46 securing laptop computers
PPT
Netdefender
PPTX
firewallpresentation-100826052003-phpapp02.pptx
PPT
New internet security
PPT
NewIinternet security
PPTX
Data security in online commerce
DOCX
Wireless Security and Mobile DevicesChapter 12Princi.docx
PPT
Bluetooth security
PPTX
Bluejacking
ODP
Portakal Teknoloji Otc Lyon Part 1
amrapali builders@@@bluetooth hacking.pdf
Security threats analysis in bluetooth enabled mobile devices
INTRODUCTION TO BLUETOOTH HACKING (An0n Ali).ppt
Bluetooth network-security-seminar-report
A Comprehensive Approach to Secure Group Communication in Wireless Networks
IoT setup and pairing
Blue jacking
Bluejacking ppt.pptx\Bluejacking is used for sending unauthorized messages to...
Net Defender
V3I6-0108
Ce hv6 module 46 securing laptop computers
Netdefender
firewallpresentation-100826052003-phpapp02.pptx
New internet security
NewIinternet security
Data security in online commerce
Wireless Security and Mobile DevicesChapter 12Princi.docx
Bluetooth security
Bluejacking
Portakal Teknoloji Otc Lyon Part 1

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PPT
Teaching material agriculture food technology
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25 Week I
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
Teaching material agriculture food technology
Spectroscopy.pptx food analysis technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology

Bluetooth Hacking

  • 1. Seminar on Blue tooth Hacking [security and threats] By- Dhanashree Waikar Roll No – 3379 Project Guide – Prof. N. R. Talhar
  • 2. Overview Introduction Bluejack attack Bluespamming The Bluesnarf attack The Bluebug attack Helomoto Crack pin code Blueprinting Other attacks [Trojans, Viruses, worms] Security levels Countermeasures
  • 3. Bluetooth introduction Wireless networking technology For short range devices Speed-2.4Ghz Range is between 10 to 30m Data transfer rate is 1mbps Bluetooth SIG Founded in 1998 Trade association Owns and licenses IP
  • 4. Bluejack OBEX push attack Object exchange protocol for exchanging data with one another (data like files, picture, business cards, calendar entries etc.) Commonly send ‘business card’ with message via OBEX Variants Bluetoothing Bluechatting Modifying a remote mobile phone’s address book Bluespamming
  • 5. BlueSnarf Attack Discovered by Marcel Holtmann Published in October 2003 BlueSnarf exploits weak OBEX implementation on mobile phones OBEX pull attack Attacker involves the use of the OBEX protocol to forcibly pull sensitive data out of the victim’s mobile phone Extreme vulnerableand damage possible through bluesnarfing
  • 6. BlueSnarf Attack continued … Can steal sensitive data without the knowledge of the victim Address book, Photographs, Music, videos, calendar, IMEI, noReading/decoding sms messages etc. Adv connects to OBEX push profile No authentication, no pairing needed -> invisible connection
  • 7. Bluebug Discovered by Martin Herfurt Public field test - CeBIT 2004 Full access to AT command set hence Full phone control Based on AT Commands -> not OBEX Typical use cases : - Call control (turning phone into bug) Initiating a new call to predefined no.
  • 8. Helomoto Bluesnarf + Bluebug Requires entry in 'Device History' OBEX PUSH to create entry Connect RFCOMM to Hands free or Headset No Authentication required Full AT command set access
  • 9. Pairing When two devices first meet, they “pair” Slave must have knowledge of BD_ADDR through inquiry or user input Pairing information recorded, may contain authentication credentials Inquiry mode no longer necessary since BD_ADDR is recorded on slave
  • 10. Creation of k_init Creation of k_init
  • 11. Creation of k_ab Creation of k_ab
  • 13. The Basic Attack List of messages sent during pairing and authentication process
  • 14. The Basic Attack Structure The Basic Attack Structure
  • 15. Blueprinting Used for generating statistics about manufacturers and models Bluetooth device address->format->MM:MM:MM:XX:XX:XX Whether there are devices in range that have issues with Bluetooth security Used to get knowledge of different models that can be affected Use service discovery protocol (SDP) Attacker  sends problem  Bluetooth device  Bluetooth device  sends back hash  attacker
  • 16. Virus Worms and Trojans Viruses do not have the capability to spread and infect devices on their own. Even worms are malicious files that cause harm to the target device. Trojans are malicious files that can be used for carrying out harmful activities on the target device.
  • 17. Security A device can implement three different security modes: Nonsecure: A device will not initiate any security measures, so communication takes place without authentication or encryption. Service-level enforced security: Two devices can establish an ACL link in a nonsecure manner. Security procedures are initiated when a L2CAP (Logical Link Control and Adaptation Protocol) channel request is made. Link-level enforced security: Security procedures are initiated when the ACL link is being established.
  • 18. Countermeasures One should not enable Bluetooth unless it is necessary. One should not accept files or business cards or any other incoming Bluetooth data from unknown people. Avoid using short pairing codes. Change the default name