Tuesday, September 2, 2008

Bluetooth Hacking

Different types of Bluetooth hacks are:-

1. Bluejacking

2. Bluesnarfing

3. Bluebugging

4. Bluetoothing


1. Bluejacking

It is the simplest of the four. The hacker uses it by making an attempt to send a phone contact or business card to another nearby phone. The ‘name' field of the contact can be misused by replacing it with a suggestive text so that the target device reads it as a part of intimation query displayed on its screen. This may be thought of as equivalent to spam e-mail since both are unsolicited messages displayed on recipients' end without consent, and by exploiting the inherent nature of communication.

2. Bluesnarfing

It goes a step further and actually accesses or steals data like messages, calendar, phone book etc., from the target device in an unauthorized manner which includes bypassing the usual paring requirement. Here, the problem is bigger since there have been reports of the tools that use methods such as device address guessing and brute force in order to break-in, even when device is configured as ‘invisible'.

3.Bluebugging

In this method the victim device is controlled by the attacker who sends commands to perform actions as if having physical access to the device this is a functionality analogous to Trojans.The tools for Bluebugging include ones that run off the PCs, which means laptops with high range Bluetooth connectivity, which makes things even worse.

4.Bluetoothing

Finally, it is Bluetoothing which typically means social networking in short range, and possibility of harassment from the security point of view. Then there are programmes for Bluetooth PIN code cracking as well.

Tools using for hacking
~~~~~~~~~~~~~~~~

1.Super Bluetooth Hack

This Bluetooth hack is one of the most widely used and is used by both professional hackers as well as people who just want to have fun by sneaking into other's mobiles, without even knowing about the security issues that may arise in doing so.This tool demonstrates characteristics of both Bluesnarfing and Bluebugging.

Security Issues With This Tool
--------------------------------

Following are the major threats from this application:-

1.To get around pairing, the attacker can employ a bit of social engineering, say renaming phone to something as ‘Download Updates' or to a known target-trusted companion in the vicinity, or even get physical access to phone and perform one-time pairing since subsequent connections do not require any user intervention at target device. Once connected, a long list of information categories is displayed which can be possibly gleaned.

2.Another threat from this application is that the hacker can gain access to users calls menu and may use it in a way that the target phone starts dialling the requested number automatically. The attacker even gains access to the option of putting the call on hold or to hang up.

3.Another issue that may arise is that the hacker can fetch target phone's entire phone book, dialled calls list etc. which can be saved on attacker's device.

4.This application can make the target extremely vulnerable as it works and fetches a plethora of details in addition to sending operative commands, without having to be installed on target device.Usual remote-control devices are installed on both devices and use their own authentication to send commands, as Super Bluetooth Hack by passes this requirement. This shows how intensive Bluetooth surveillance can get, particularly when combined with social engineering.






(Courtesy: hubpages.com)

Saturday, August 30, 2008

What Is Bluetooth Technology?

Bluetooth is a wireless protocol utilizing short-range communications technology facilitating data transmission over short distances from fixed or mobile devices, creating wireless personal area networks.The intent behind the development of Bluetooth was the creation of a single digital wireless protocol, capable of connecting multiple devices and overcoming issues arising from synchronization of these devices.Bluetooth uses a very robust radio technology called frequency hopping spread spectrum.It chops up the data being sent and transmits chunks of it on up to 75 different frequencies.In its basic mode,the modulation is Gaussian frequency shift keying (GFSK).It can achieve a gross data rate of 1 Mb/s.

Bluetooth provides a way to connect and exchange information between devices such as mobile phones, telephones, laptops, personal computers, printers, GPS receivers, digital cameras, and video game consoles over a secure, globally unlicensed Industrial, Scientific, and Medical(ISM) 2.4 GHz short-range radio frequency bandwidth. The Bluetooth specifications are developed and licensed by the Bluetooth Special Interest Group (SIG).

Bluetooth is a standard and communications protocol primarily designed for low power consumption, with a short range (power-class-dependent: 1 meter, 10 meters, 100 meters) based on low-cost transceiver microchips in each device.Bluetooth enables these devices to communicate with each other when they are in range. The devices use a radio communications system, so they do not have to be in line of sight of each other, and can even be in other rooms,as long as the received transmission is powerful enough.Bluetooth device class indicates the type of device and the supported services of which the information is transmitted during the discovery process.

The range of different classes
---------------------------------------------

(Courtesy:- wikipedia)