Description: Bluetooth is a wireless protocol used for short distance communication. The most prevalent use is by mobile phones, laptops and other handheld devices. Since its widespread uses many vulnerabilites have been discovered in Bluetooth and tools released by hackers and security researchers. Some of the well know attacks on Bluetooth include Bluesnarf(OBEX Push attack), Bluebug (Issuing AT commands), Bluesmack (Causing buffer overflows and Denial of Service attacks using L2CAP echo feature), Bluestab (Denial of Service Attack), Bluebump (Forced re-keying), Bluespoof (Clone a trusted device), Bluechop (Distrupt established piconets), Blueprinting (fingerprinting bluetooth devices), Bluetooone (Enhancing the range of a bluetooth dongle) and many others. A great place to learn about Bluetooth hacking would be Trifinite.org.
In this video posted at InfinityExists, Strome explains several bluetooth attacks used against mobile phones. He demonstrates the Bluebug attack which exploits a security loophole on cell phones allowing the attacker to take full control of the device. The Bluebug attack enables an attacker to initiate calls, read & send SMS messages, read & edit the phone book, and change settings. Furthermore, Strome shows another popular bluetooth attack called Bluesnarfing a.k.a. the OBEX Push Attack. Bluesnarfing allows an attacker to extract, create, and delete files on the mobile device.
A high resolution version of the video can be downloaded here.
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
hey you did not even tell us how to get the bluesnarfing thing....please tell me how to do this