1. Bluejacking
2. Bluesnarfing
3. Bluebugging
4. Bluetoothing
1. Bluejacking
It is the simplest of the four. The hacker uses it by making an attempt to send a phone contact or business card to another nearby phone. The ‘name' field of the contact can be misused by replacing it with a suggestive text so that the target device reads it as a part of intimation query displayed on its screen. This may be thought of as equivalent to spam e-mail since both are unsolicited messages displayed on recipients' end without consent, and by exploiting the inherent nature of communication.
2. Bluesnarfing
It goes a step further and actually accesses or steals data like messages, calendar, phone book etc., from the target device in an unauthorized manner which includes bypassing the usual paring requirement. Here, the problem is bigger since there have been reports of the tools that use methods such as device address guessing and brute force in order to break-in, even when device is configured as ‘invisible'.
3.Bluebugging
In this method the victim device is controlled by the attacker who sends commands to perform actions as if having physical access to the device this is a functionality analogous to Trojans.The tools for Bluebugging include ones that run off the PCs, which means laptops with high range Bluetooth connectivity, which makes things even worse.
4.Bluetoothing
Finally, it is Bluetoothing which typically means social networking in short range, and possibility of harassment from the security point of view. Then there are programmes for Bluetooth PIN code cracking as well.
Tools using for hacking
~~~~~~~~~~~~~~~~
1.Super Bluetooth Hack
This Bluetooth hack is one of the most widely used and is used by both professional hackers as well as people who just want to have fun by sneaking into other's mobiles, without even knowing about the security issues that may arise in doing so.This tool demonstrates characteristics of both Bluesnarfing and Bluebugging.
Security Issues With This Tool
--------------------------------
Following are the major threats from this application:-
1.To get around pairing, the attacker can employ a bit of social engineering, say renaming phone to something as ‘Download Updates' or to a known target-trusted companion in the vicinity, or even get physical access to phone and perform one-time pairing since subsequent connections do not require any user intervention at target device. Once connected, a long list of information categories is displayed which can be possibly gleaned.
2.Another threat from this application is that the hacker can gain access to users calls menu and may use it in a way that the target phone starts dialling the requested number automatically. The attacker even gains access to the option of putting the call on hold or to hang up.
3.Another issue that may arise is that the hacker can fetch target phone's entire phone book, dialled calls list etc. which can be saved on attacker's device.
4.This application can make the target extremely vulnerable as it works and fetches a plethora of details in addition to sending operative commands, without having to be installed on target device.Usual remote-control devices are installed on both devices and use their own authentication to send commands, as Super Bluetooth Hack by passes this requirement. This shows how intensive Bluetooth surveillance can get, particularly when combined with social engineering.
(Courtesy: hubpages.com)
Tools using for hacking
~~~~~~~~~~~~~~~~
1.Super Bluetooth Hack
This Bluetooth hack is one of the most widely used and is used by both professional hackers as well as people who just want to have fun by sneaking into other's mobiles, without even knowing about the security issues that may arise in doing so.This tool demonstrates characteristics of both Bluesnarfing and Bluebugging.
Security Issues With This Tool
--------------------------------
Following are the major threats from this application:-
1.To get around pairing, the attacker can employ a bit of social engineering, say renaming phone to something as ‘Download Updates' or to a known target-trusted companion in the vicinity, or even get physical access to phone and perform one-time pairing since subsequent connections do not require any user intervention at target device. Once connected, a long list of information categories is displayed which can be possibly gleaned.
2.Another threat from this application is that the hacker can gain access to users calls menu and may use it in a way that the target phone starts dialling the requested number automatically. The attacker even gains access to the option of putting the call on hold or to hang up.
3.Another issue that may arise is that the hacker can fetch target phone's entire phone book, dialled calls list etc. which can be saved on attacker's device.
4.This application can make the target extremely vulnerable as it works and fetches a plethora of details in addition to sending operative commands, without having to be installed on target device.Usual remote-control devices are installed on both devices and use their own authentication to send commands, as Super Bluetooth Hack by passes this requirement. This shows how intensive Bluetooth surveillance can get, particularly when combined with social engineering.
(Courtesy: hubpages.com)