Bluetooth Hacking
Bluetooth Hacking
Bluetooth Hacking
Bluetooth Hacking
[security and threats]
By-
Dhanashree Waikar
Roll No – 3379
September 8, 2020 3
Bluejack
• OBEX push attack
• Object exchange protocol for exchanging
data with one another (data like files,
picture, business cards, calendar entries
etc.)
• Commonly send ‘business card’ with
message via OBEX
• Variants
• Bluetoothing
• Bluechatting
• Modifying a remote mobile phone’s
address book
• Bluespamming
September 8, 2020 4
BlueSnarf Attack
• Discovered by Marcel Holtmann
• Published in October 2003
• BlueSnarf exploits weak OBEX
implementation on mobile phones
• OBEX pull attack
• Attacker involves the use of the
OBEX protocol to forcibly pull
sensitive data out of the victim’s
mobile phone
• Extreme vulnerableand damage
possible through bluesnarfing
September 8, 2020 5
BlueSnarf Attack continued…
• Can steal sensitive data without the
knowledge of the victim
• Address book, Photographs,
• Music, videos, calendar,
• IMEI, noReading/decoding sms
messages etc.
• Adv connects to OBEX push profile
• No authentication, no pairing needed
-> invisible connection
September 8, 2020 6
Bluebug
• Discovered by Martin Herfurt
• Public field test - CeBIT 2004
• Full access to AT command set hence
Full phone control
• Based on AT Commands -> not OBEX
• Typical use cases : -
• Call control (turning phone into bug)
• Initiating a new call to predefined no.
September 8, 2020 7
Helomoto
• Bluesnarf + Bluebug
September 8, 2020 8
Pairing
• When two devices first meet, they
“pair”
• Slave must have knowledge of
BD_ADDR through inquiry or user
input
• Pairing information recorded, may
contain authentication credentials
• Inquiry mode no longer necessary since
BD_ADDR is recorded on slave
September 8, 2020 9
Creation of k_init
Creation of k_init
September 8, 2020 10
Creation of k_ab
Mutual authentication
September 8, 2020 12
The Basic Attack
September 8, 2020 16
Security
• A device can implement three different security
modes:
• Nonsecure: A device will not initiate any
security measures, so communication takes
place without authentication or encryption.
• Service-level enforced security: Two devices
can establish an ACL link in a nonsecure
manner. Security procedures are initiated
when a L2CAP (Logical Link Control and
Adaptation Protocol) channel request is
made.
• Link-level enforced security: Security
procedures are initiated when the ACL link
is being established.
September 8, 2020 17
Countermeasures
• One should not enable Bluetooth unless
it is necessary.
• One should not accept files or business
cards or any other incoming Bluetooth
data from unknown people.
• Avoid using short pairing codes.
• Change the default name
September 8, 2020 18
Any Questions?
September 8, 2020 19
Thank you
September 8, 2020 20