user:yan:bluetooth
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
user:yan:bluetooth [2017/05/20 14:07] – created yan | user:yan:bluetooth [2017/05/20 14:35] (current) – [Bluetooth] yan | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | BlueZ has largery | + | ====== Bluetooth ====== |
+ | BlueZ has changed | ||
- | All possible notes written below are only hints meant to penetration testing and security enhancing and are not anyhow | + | All possible notes written below are only hints meant for penetration testing and security enhancing and are not meant as primer to any illegal action |
== what's outdated == | == what's outdated == | ||
Line 17: | Line 18: | ||
* **scan** - on/off scanning for devices | * **scan** - on/off scanning for devices | ||
* **visibility, | * **visibility, | ||
- | * **info** - nice function, you need to use device " | + | * **info** - nice function, you need to use device " |
=== passive monitoring (airodump like) & wireshark connection === | === passive monitoring (airodump like) & wireshark connection === | ||
- | Basically typical BT devices which are nowadays mounted into PC are not accustomed to be used to just scan ether and send all informations to PC, but just informs PC of things | + | Basically typical BT devices which are nowadays mounted into PC are not accustomed to be used to just scan ether and send all informations to PC, but just informs PC of things |
=== possible hacks === | === possible hacks === | ||
- | there is a nice page (hope it still works, if not, i'll try to paste it somewhere else) which basically sums up situation in problematics in 2005 (so it's pretty outdated, but probably usable | + | There is a nice page (hope it still works, if not, i'll try to paste it somewhere else) which basically sums up situation in problematics in 2005 (so it's pretty outdated, but probably usable when some older device comes into range)[[http:// |
- | * **bluejacking, | + | * **bluejacking, |
* **HID attacks** - those can be probably easiest to fruitify - basically you should be able to intercept BT keyboard in manner that you can send your own commands through this interface or you can take aquistion of communication. | * **HID attacks** - those can be probably easiest to fruitify - basically you should be able to intercept BT keyboard in manner that you can send your own commands through this interface or you can take aquistion of communication. | ||
- | * **carwhisperer** - have no idea how actual this SW really is, but people ussually change their mobile phone more often than their cars. It should be actually | + | * **carwhisperer** - I have no idea how actual this SW really is, but people ussually change their mobile phone more often than their cars. It should be able to record communication in car or in opposite direction |
- | + | ===== sources | |
- | ===== citations | + | |
[1] [[https:// | [1] [[https:// | ||
Line 37: | Line 37: | ||
[3] [[https:// | [3] [[https:// | ||
+ | |||
+ | [4] [[http:// | ||
+ | |||
+ | [5] [[https:// | ||
+ | |||
+ | [6] [[http:// | ||
user/yan/bluetooth.1495289229.txt.gz · Last modified: 2017/05/20 14:07 by yan