Description: Bluetooth traffic analysis is hard. Whilst other radio communications technologies (802.11, Zigbee) support promiscuous mode, Bluetooth dongles cannot monitor all traffic due to a pseudo-random frequency hopping system. Until recently the only way to monitor Bluetooth traffic was to use expensive software radio peripherals. Project Ubertooth is an open hardware device that has opened up new opportunities to capture Bluetooth traffic between devices, even in non-discoverable mode.
As part of this presentation I will demonstrate the latest frequency hopping functionality that allows us to follow a connection as it changes frequency 1600 times per second and capture the packet data for analysis. The talk will also explain the technical challenges that have been overcome while attempting to implement Bluetooth protocol analysis on affordable hardware, such as the obscure error correction methods that many manufacturers have chosen not to implement in their products.
The demonstrations will include tools written to work with the Ubertooth device as well as integration with both Kismet and Wireshark. Additionally some of the tools will also work with the GnuRadio platform and the USRP hardware, this will be demonstrated if time allows.
DOMINIC SPILL BIO
Dominic Spill has been investigating Bluetooth security using software radio since 2007. In that time he has built the first promiscuous Bluetooth packet sniffer based on software radio and collaborated with other researchers to produce open source Bluetooth traffic analysis tools. He is currently working as a developer and security researcher in Melbourne.
Tags: securitytube , hacking , hackers , information security , convention , computer security , ruxcon-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.