SlideShare a Scribd company logo
BLUETOOTH NETWORK SECURITY
BY S.ROHIT SAGAR
TABLEOF CONTENT
 INTRODUCTION
 ABOUT BLUETOOTH
 BLUETOOTH NETWORKS
 BLUETOOTH ARCHITECTURE
 SECURITY ASPECTS IN BLUETOOTH
 CONNECTION ESTABLISHMENT
 USED SOFTWERE
A) FOR DISCOVERING DEVICES
B) FOR HACKING
 EFFECTIVENESS OFATTACK
 CONCLUSION
BLUETOOTH HACKING THREATS &PREVENTIONS
INTRODUCTION
Wireless communications offer organizations and users many benefits such as
portability and flexibility, increased productivity, and lower installation costs.
Wireless local area network (WLAN) devices, for instance, allow users to move
their laptops from place to place within their offices without the need for wires and
without losing network connectivity.
Ad hoc networks, such as those enabled by Bluetooth, allow users to:
 Data synchronization with network systems and application sharing
between devices.
 Eliminates cables for printer and other peripheral deviceconnections.
Specific threats and vulnerabilities to wireless networks and handheld devices
include thefollowing:
 All the vulnerabilities that exist in a conventional wired network apply to
wirelesstechnologies.
 Malicious entities may gain unauthorized access to an agency‟s computer
network through wireless connections, bypassing any firewallprotections.
ABOUT BLUETOOTH
The original architecture for Bluetooth was developedby
Ericson Mobile Communication Co. Bluetooth was originally designed primarily
as a cable replacement protocol for wirelesscommunications.
Among the array of devices that are anticipated are cellular phones, PDAs,
notebook computers, modems, cordless phones, pagers, laptop computers,
cameras, PC cards, fax machines, andprinters.
Now Bluetooth specificationis:
 The 802.11 WLAN standards.
 Unlicensed 2.4 GHz–2.4835 GHz ISM(industrial, scientific, medical
applications) frequency band.
 Frequency-hopping spread-spectrum (FHSS) technology to solve
interference problems.
 Transmission speeds up to 1Mbps
BluetoothClassesand Specifications
BLUETOOTHNETWORKS
Bluetooth devices can form three types ofnetworks:
 Point to PointLink
 PiconetNetwork
 Ad-hoc or ScatternetNetwork
PointtoPoint Link
enabled devices shareWhen two Bluetooth
information or data that is called point to point link.
Master
Device
Network /Link
Slave
Device
PiconetNetwork
When there is a collection of devices paired with each other, it
forms a small personal area network called „Piconet‟. APiconet consists of a
master and at most seven activeslaves.
Each Piconet has its own hopping sequence and the master and all slaves share the
same channel.
Master
Device
Slave
Device
Slave
Device
Slave
Device
Departmentof Electronics& Communication.
Ad-hoc or ScatternetNetwork
Twoor more piconets connected to eachother
by means of a device (called „bridge‟) participating in both the piconets, form a
Scatternet Network.
The role of bridge is to transmit data across piconets.
Picont1 Piconet2
Fig: Scatternet Network
When a number of Bluetooth devices communicate to each other in same vicinity,
there is a high level of interference. To combat interference, Bluetooth technology
applies a fast frequency-hopping scheme which hoops over 79 channels 1600 times
per second.
For devices to communicate to each other using Bluetooth they need to be paired
with each other to have synchronized frequency-hoppingsequence.
BLUETOOTHARCHITECTURE
The Bluetooth core system has three parts:
 RF transceiver
 Baseband
 Protocol-stack
Departmentof Electronics& Communication.
SECURITYASPECTSIN BLUETOOTH
The Bluetooth-system provide security attwo level-
 At Linklayer
 At Applicationlayer
Link layer security
Four different entities are used for maintaining security at
the link layer: a Bluetooth device address, two secret, keys, and a pseudo-random
number that shall be regenerated for each newtransaction.
The four entities and their sizes aresummarized in Table-
Table 1.1: Entities used in authentication and encryptionprocedures
Applicationlayer security specification
Entity Size
BD_ADDR 48bits
Private user key, authentication 128bits
Private user key, encryption
Configurable length (byte-wise)
8-128bits
RAND 128bits
.
BREAKINGINTO SECURITY
Bluetooth devices themselves have inherent security
vulnerabilities. For example, malicious users can use wireless microphones as
bugging devices. Although such attacks have not been documented because
Bluetooth is not yet commercially prevalent, incidents have been recorded of
successful attacks on PCs using programs such as Back Orifice and Netbus
Attack Tools& Programs
 Hardware Used: Dell XPS, Nokia N95, Nokia 6150, Hp IPAQ HX2790b.
 Operating Systems: Ubuntu, Backtrack, Windows Vista, Symbian OS,
windows mobile.
 Software used: Bluebugger, Bluediving, Bluescanner, Bluesnarfer,
BTscanner, Redfang, Blooover2, Ftp_bt.
 Dell laptop with windows vista to be broken into and for scanning then with
Linux to attempt attacks. Pocket pc for being attacked, and one mobile for
attacking one for beingattacked.
Attackingmethodology
The first & last thing to break security of a Bluetooth
device is set up a connection or pairing. After that we can use the program to
access into device data. Using tools to find the MAC address of nearby devices to
attack. This generally finds devices set to discoverable although programs exist with
a brute force approach that detects them when hidden. These programs also
provide other basic information such as device classes and names.
Departmentof Electronics& Communication.
AttackingToolsor Tricks
Bluejacking
Sending an unsolicited message over Bluetooth generally harmless
but can be considered annoying at worst. Bluejacking is generally done by sending
a V-card (electronic business card) to the phone and using the name field as the
message.
OBEXPush
A way of bypassing authentication by sending a file designed to be
automatically accepted such as a vcard and instead using OBEX to forward a
request for data or in some cases control. Used in the below attacks.
Bluesnarfing
Through it we can access to data on a device via Bluetooth such as
text messages, contact lists, calendar, emails etc. This uses the OBEX push profile
to attempt to send an OBEX GET command to retrieve known filenames such as
telecom/pb.vcf. The enhancement to this Bluesnarf++ connects to the OBEX FTP
server to transfer thefiles.
Here 'Snarf' - networking slang for 'unauthorizedcopy.
Bluesnarfing consistsof:
 DataTheft
 Calendar
● Appointments
● Images
1. PhoneBook
● Names, Addresses,Numbers
● PINs and othercodes
● Images
Devices: Ericsson R520m, T39m, T68, Sony Ericsson T68i, T610, Z1010,
Nokia 6310, 6310i, 8910,8910i
Departmentof Electronics& Communication.
Long Distance Attacking (Blue Sniper)
This trick is tested in beginning of August 2004. This experiment has
done in Santa MonicaCalifornia.
The attacker has a class 1 Bluetooth device (called „dongle‟) with software. The
bugged or snarfed device was class 2 device (Nokia 6310i) at distance of 1.78 km
(1.01 miles).
Blueprinting
Blueprinting is fingerprinting Bluetooth Wireless Technology interfaces of
devices. This work has been started by Collin R. Mulliner and Martin Herfurt.
Relevant to all kinds ofapplications:
– Security auditing.
– Device Statistics.
– Automated ApplicationDistribution.
Attackingsoftware
ForDiscoveringBluetooth Devices
BlueScanner
- BlueScannersearches out for Bluetooth-enabled devices. It will try
to extract as much information as possible for each newly discovered device.
BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden
Bluetooth-enabled devices.
BTBrowser- Bluetooth Browser is a J2ME application that can browse and
explore the technical specification of surrounding Bluetooth-enabled devices. You
can browse device information and all supported profiles and service records of
each device. BTBrowser works on phones that supports JSR-82 - the Java
Bluetooth specification.
BTCrawler - BTCrawler is a scanner for Windows Mobile based devices. It scans for
other devices in range and performs service query. It implements the BlueJacking
and BlueSnarfingattacks.
Effectivenessof Attacks
Laptop
This attacks here where a resounding failure with all devices being
attacked requiring user input to function. Bluebugging and Bluesnarfing where both
attempted several times with trial and error the correct channels for these attacks
where found and used to successfully contact the phone but failed to work without
authentication.
VsMobiles
Attacks made against the Nokia N95 and Nokia 6250 both
connected to the phone but required the user to accept to continue and thus where
considered a failure. Attacks were also made against other nearby mobiles with
either the same result or in a single case a successful transfer with Bluesnarfing but
no data gathered (Unusual filenames whereassumed).
Departmentof Electronics& Communication.
CONCLUSION:
SECURE YOURDEVICE
Bluetooth socialengineering
Bluetooth is used by people daily so it is possible to use social
engineering techniques to attack devices. One of the most common uses of
Bluetooth is with Mobile Phone can be an interesting part of social engineering to
examine.
Some users tend to accept incoming connections leaving
themselves at risk to outside attack. More a lack of education than anything else
causes people not to recognize a threat when they see one and accept incoming
connections. This is an interesting way of using social engineering to break into
devices.
SecurityEffectiveness
The standard security method for Bluetooth is to simple
have the device hidden or turned off and many devices require user input for any
incoming message orconnection.
This is surprisingly effective as when a device requires
authentication for even a vcard it is difficult to find a way in without an unsecured
channel. The biggest security risk seems to be the users themselves several attacks
succeeded simple because the users accepted the incoming connection (many
harmless audits where performed on bypassers) allowing access on their device (we
considered this a failure of the attack). No amount of security can preventa
user opening the door so to speak. No additional security software was found for
Bluetooth.
THANK YOU

More Related Content

PPTX
Bluetooth Network security
PPT
Bluetooth based-smart-sensor-network
PPTX
Embedded system seminar
PPTX
PPT on Bluetooth Based Wireless Sensor Networks
PPTX
ACCIDENT PREVENTION AND DETECTION SYSTEM
PPTX
blutooth based smart sensor network
PPTX
Internet of Things (IoT) Based Smart Security & Home Automation System.
PPTX
SPINS: Security Protocols for Sensor Networks
Bluetooth Network security
Bluetooth based-smart-sensor-network
Embedded system seminar
PPT on Bluetooth Based Wireless Sensor Networks
ACCIDENT PREVENTION AND DETECTION SYSTEM
blutooth based smart sensor network
Internet of Things (IoT) Based Smart Security & Home Automation System.
SPINS: Security Protocols for Sensor Networks

What's hot (20)

PPT
PPTX
Wireless Sensor Networks ppt
PPT
Polytronics
PPT
Silent sound-technology ppt final
PPT
Security in GSM(2G) and UMTS(3G) Networks
PPTX
Mobile communication systems Introduction
PPTX
Home automation using wifi
PPTX
Wi-max Technology PPT
DOCX
Bluetooth paper (IEEE)
PPTX
Zigbee technology ppt
PPTX
SMART DUST
PDF
IEEE 2023 - 2024 EMBEDDED SYSTEM TITLES
PPTX
PDF
Coal Mine Safety Monitoring and Alerting System
PPTX
Aeronautical communication seminar presentation
PPTX
Sensor Based Blind Stick
PPTX
IoT BASED SMART HOME USING ARDUINO
PPT
WIRELESS SENSOR NETWORK
PPTX
COMPUTER CLOTHING
Wireless Sensor Networks ppt
Polytronics
Silent sound-technology ppt final
Security in GSM(2G) and UMTS(3G) Networks
Mobile communication systems Introduction
Home automation using wifi
Wi-max Technology PPT
Bluetooth paper (IEEE)
Zigbee technology ppt
SMART DUST
IEEE 2023 - 2024 EMBEDDED SYSTEM TITLES
Coal Mine Safety Monitoring and Alerting System
Aeronautical communication seminar presentation
Sensor Based Blind Stick
IoT BASED SMART HOME USING ARDUINO
WIRELESS SENSOR NETWORK
COMPUTER CLOTHING
Ad

Viewers also liked (20)

PPT
Bluetooth security
PPT
bluetooth-security
PPT
Bluetooth technology presentation
PPTX
Bluetooth security
PPT
Bluetooth Technology
PPTX
Bluetooth Presentation
PPT
Bluetooth Presentation
PPTX
Bluetooth
PPT
Solar Mobile Charger PPT
PPTX
Bluetooth [in]security
PPSX
Green Manufacturing
PDF
Blue Tooth Technoloty
PPT
Wireless security presentation
PPTX
Communication Based Train Control (Mobile Train Radio Communication)
PPT
Wireless LAN security
PPT
Bluetooth Slides
PPTX
Paper battery
PPT
Wireless charging of mobile PPT.
DOC
SS Singh Resume Mod (5)
PPT
Bluetooth security
bluetooth-security
Bluetooth technology presentation
Bluetooth security
Bluetooth Technology
Bluetooth Presentation
Bluetooth Presentation
Bluetooth
Solar Mobile Charger PPT
Bluetooth [in]security
Green Manufacturing
Blue Tooth Technoloty
Wireless security presentation
Communication Based Train Control (Mobile Train Radio Communication)
Wireless LAN security
Bluetooth Slides
Paper battery
Wireless charging of mobile PPT.
SS Singh Resume Mod (5)
Ad

Similar to Bluetooth network-security-seminar-report (20)

PDF
Security threats analysis in bluetooth enabled mobile devices
PDF
Bluetooth
DOC
Bluetooth
PPTX
Bluejacking ppt.pptx
PPTX
Bluejacking ppt.pptx\Bluejacking is used for sending unauthorized messages to...
PDF
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
PDF
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
PDF
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
PPTX
Blue jacking
PDF
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
PDF
IT WRITING SAMPLES PORTFOLIO
PPT
Introduction to Bluetooth technology
PPTX
Bluejacking sadhana
DOC
Ichci13 submission 104 (1)
DOCX
The mfn 3
PPTX
Iot(security)
PPTX
Device Hacking
PPTX
Bluetooth technology
PDF
Bluetooth Paper Presentation
Security threats analysis in bluetooth enabled mobile devices
Bluetooth
Bluetooth
Bluejacking ppt.pptx
Bluejacking ppt.pptx\Bluejacking is used for sending unauthorized messages to...
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
Blue jacking
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
IT WRITING SAMPLES PORTFOLIO
Introduction to Bluetooth technology
Bluejacking sadhana
Ichci13 submission 104 (1)
The mfn 3
Iot(security)
Device Hacking
Bluetooth technology
Bluetooth Paper Presentation

Recently uploaded (20)

PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
Current and future trends in Computer Vision.pptx
PDF
Design Guidelines and solutions for Plastics parts
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
Feature types and data preprocessing steps
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
introduction to high performance computing
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
Software Engineering and software moduleing
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
communication and presentation skills 01
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
R24 SURVEYING LAB MANUAL for civil enggi
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Current and future trends in Computer Vision.pptx
Design Guidelines and solutions for Plastics parts
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Feature types and data preprocessing steps
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
introduction to high performance computing
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Software Engineering and software moduleing
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Exploratory_Data_Analysis_Fundamentals.pdf
communication and presentation skills 01
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf

Bluetooth network-security-seminar-report

  • 2. TABLEOF CONTENT  INTRODUCTION  ABOUT BLUETOOTH  BLUETOOTH NETWORKS  BLUETOOTH ARCHITECTURE  SECURITY ASPECTS IN BLUETOOTH  CONNECTION ESTABLISHMENT  USED SOFTWERE A) FOR DISCOVERING DEVICES B) FOR HACKING  EFFECTIVENESS OFATTACK  CONCLUSION
  • 3. BLUETOOTH HACKING THREATS &PREVENTIONS INTRODUCTION Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless local area network (WLAN) devices, for instance, allow users to move their laptops from place to place within their offices without the need for wires and without losing network connectivity. Ad hoc networks, such as those enabled by Bluetooth, allow users to:  Data synchronization with network systems and application sharing between devices.  Eliminates cables for printer and other peripheral deviceconnections. Specific threats and vulnerabilities to wireless networks and handheld devices include thefollowing:  All the vulnerabilities that exist in a conventional wired network apply to wirelesstechnologies.  Malicious entities may gain unauthorized access to an agency‟s computer network through wireless connections, bypassing any firewallprotections.
  • 4. ABOUT BLUETOOTH The original architecture for Bluetooth was developedby Ericson Mobile Communication Co. Bluetooth was originally designed primarily as a cable replacement protocol for wirelesscommunications. Among the array of devices that are anticipated are cellular phones, PDAs, notebook computers, modems, cordless phones, pagers, laptop computers, cameras, PC cards, fax machines, andprinters. Now Bluetooth specificationis:  The 802.11 WLAN standards.  Unlicensed 2.4 GHz–2.4835 GHz ISM(industrial, scientific, medical applications) frequency band.  Frequency-hopping spread-spectrum (FHSS) technology to solve interference problems.  Transmission speeds up to 1Mbps BluetoothClassesand Specifications
  • 5. BLUETOOTHNETWORKS Bluetooth devices can form three types ofnetworks:  Point to PointLink  PiconetNetwork  Ad-hoc or ScatternetNetwork PointtoPoint Link enabled devices shareWhen two Bluetooth information or data that is called point to point link. Master Device Network /Link Slave Device PiconetNetwork When there is a collection of devices paired with each other, it forms a small personal area network called „Piconet‟. APiconet consists of a master and at most seven activeslaves. Each Piconet has its own hopping sequence and the master and all slaves share the same channel. Master Device Slave Device Slave Device Slave Device
  • 6. Departmentof Electronics& Communication. Ad-hoc or ScatternetNetwork Twoor more piconets connected to eachother by means of a device (called „bridge‟) participating in both the piconets, form a Scatternet Network. The role of bridge is to transmit data across piconets. Picont1 Piconet2 Fig: Scatternet Network When a number of Bluetooth devices communicate to each other in same vicinity, there is a high level of interference. To combat interference, Bluetooth technology applies a fast frequency-hopping scheme which hoops over 79 channels 1600 times per second. For devices to communicate to each other using Bluetooth they need to be paired with each other to have synchronized frequency-hoppingsequence.
  • 7. BLUETOOTHARCHITECTURE The Bluetooth core system has three parts:  RF transceiver  Baseband  Protocol-stack
  • 8. Departmentof Electronics& Communication. SECURITYASPECTSIN BLUETOOTH The Bluetooth-system provide security attwo level-  At Linklayer  At Applicationlayer Link layer security Four different entities are used for maintaining security at the link layer: a Bluetooth device address, two secret, keys, and a pseudo-random number that shall be regenerated for each newtransaction. The four entities and their sizes aresummarized in Table- Table 1.1: Entities used in authentication and encryptionprocedures Applicationlayer security specification Entity Size BD_ADDR 48bits Private user key, authentication 128bits Private user key, encryption Configurable length (byte-wise) 8-128bits RAND 128bits
  • 9. . BREAKINGINTO SECURITY Bluetooth devices themselves have inherent security vulnerabilities. For example, malicious users can use wireless microphones as bugging devices. Although such attacks have not been documented because Bluetooth is not yet commercially prevalent, incidents have been recorded of successful attacks on PCs using programs such as Back Orifice and Netbus Attack Tools& Programs  Hardware Used: Dell XPS, Nokia N95, Nokia 6150, Hp IPAQ HX2790b.  Operating Systems: Ubuntu, Backtrack, Windows Vista, Symbian OS, windows mobile.  Software used: Bluebugger, Bluediving, Bluescanner, Bluesnarfer, BTscanner, Redfang, Blooover2, Ftp_bt.  Dell laptop with windows vista to be broken into and for scanning then with Linux to attempt attacks. Pocket pc for being attacked, and one mobile for attacking one for beingattacked. Attackingmethodology The first & last thing to break security of a Bluetooth device is set up a connection or pairing. After that we can use the program to access into device data. Using tools to find the MAC address of nearby devices to attack. This generally finds devices set to discoverable although programs exist with a brute force approach that detects them when hidden. These programs also provide other basic information such as device classes and names.
  • 10. Departmentof Electronics& Communication. AttackingToolsor Tricks Bluejacking Sending an unsolicited message over Bluetooth generally harmless but can be considered annoying at worst. Bluejacking is generally done by sending a V-card (electronic business card) to the phone and using the name field as the message. OBEXPush A way of bypassing authentication by sending a file designed to be automatically accepted such as a vcard and instead using OBEX to forward a request for data or in some cases control. Used in the below attacks. Bluesnarfing Through it we can access to data on a device via Bluetooth such as text messages, contact lists, calendar, emails etc. This uses the OBEX push profile to attempt to send an OBEX GET command to retrieve known filenames such as telecom/pb.vcf. The enhancement to this Bluesnarf++ connects to the OBEX FTP server to transfer thefiles. Here 'Snarf' - networking slang for 'unauthorizedcopy. Bluesnarfing consistsof:  DataTheft  Calendar ● Appointments ● Images 1. PhoneBook ● Names, Addresses,Numbers ● PINs and othercodes ● Images Devices: Ericsson R520m, T39m, T68, Sony Ericsson T68i, T610, Z1010, Nokia 6310, 6310i, 8910,8910i
  • 11. Departmentof Electronics& Communication. Long Distance Attacking (Blue Sniper) This trick is tested in beginning of August 2004. This experiment has done in Santa MonicaCalifornia. The attacker has a class 1 Bluetooth device (called „dongle‟) with software. The bugged or snarfed device was class 2 device (Nokia 6310i) at distance of 1.78 km (1.01 miles). Blueprinting Blueprinting is fingerprinting Bluetooth Wireless Technology interfaces of devices. This work has been started by Collin R. Mulliner and Martin Herfurt. Relevant to all kinds ofapplications: – Security auditing. – Device Statistics. – Automated ApplicationDistribution.
  • 12. Attackingsoftware ForDiscoveringBluetooth Devices BlueScanner - BlueScannersearches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device. BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. BTBrowser- Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. BTCrawler - BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfingattacks.
  • 13. Effectivenessof Attacks Laptop This attacks here where a resounding failure with all devices being attacked requiring user input to function. Bluebugging and Bluesnarfing where both attempted several times with trial and error the correct channels for these attacks where found and used to successfully contact the phone but failed to work without authentication. VsMobiles Attacks made against the Nokia N95 and Nokia 6250 both connected to the phone but required the user to accept to continue and thus where considered a failure. Attacks were also made against other nearby mobiles with either the same result or in a single case a successful transfer with Bluesnarfing but no data gathered (Unusual filenames whereassumed).
  • 14. Departmentof Electronics& Communication. CONCLUSION: SECURE YOURDEVICE Bluetooth socialengineering Bluetooth is used by people daily so it is possible to use social engineering techniques to attack devices. One of the most common uses of Bluetooth is with Mobile Phone can be an interesting part of social engineering to examine. Some users tend to accept incoming connections leaving themselves at risk to outside attack. More a lack of education than anything else causes people not to recognize a threat when they see one and accept incoming connections. This is an interesting way of using social engineering to break into devices. SecurityEffectiveness The standard security method for Bluetooth is to simple have the device hidden or turned off and many devices require user input for any incoming message orconnection. This is surprisingly effective as when a device requires authentication for even a vcard it is difficult to find a way in without an unsecured channel. The biggest security risk seems to be the users themselves several attacks succeeded simple because the users accepted the incoming connection (many harmless audits where performed on bypassers) allowing access on their device (we considered this a failure of the attack). No amount of security can preventa user opening the door so to speak. No additional security software was found for Bluetooth.