What is bluetooth
hacking?
Blue-tooth hacking is
hacking the other device without the knowing that device.It is also know as
Bluesnarfing. Blue-tooth hacking not only limited to cell phones ,but it
can also hacked the desktop computers, laptops etc.
Their are types of blue-tooth hacking –
1.Bluesnarfing
2.Bluejacking
3.Bluebugging
1.Bluesnarfing
It is same as the
bluetooth hacking. Bluesnarfing is the unauthorized access of
information from a wireless device through a Bluetooth connection, often between phones,
desktops, laptops, and PDAs. This allows access to a calendar, contact list,
emails and text messages, and on some phones users can copy pictures and
private videos. Currently available programs must allow connection and to be
'paired' to another phone to copy content. There may be other programs that can
break into the phones without any control, but if they exist they are not made
publicly available by the developer. One instance of Bluesnarfing software that
was demonstrated (but never made available for download) utilized weaknesses in
the Bluetooth connection of some phones. This weakness has since been patched
by the Bluetooth standard. There seem to be no available reports of phones
being Bluesnarfed without pairing, since the patching of the Bluetooth
standard.
2.Bluejacking
Bluejacking is the sending
of unsolicited messages over Bluetooth to
Bluetooth-enabled devices such as mobile phones, PDAs
or laptop computers, sending a vCard
which typically contains a message in the name field (i.e., for bluedating or bluechat) to another bluetooth enabled
device via the OBEX protocol.
3.Bluebugging
Bluebugging was first discovered
by the German researcher named Herfurt. His Bluebug program allowed the user to
ultimately take control of a victim's phone, which, in turn could be used to
call the user's phone. In other words, this meant that the Bluebug user could
simply listen to any conversation his/her victim was having in real life/time.
In addition, this program allowed for the ability to create a call forwarding
application whereby the user could receive calls intended for his/her victim.
hacking a bluetooth device is
done by using some short of brute force methods and some luck.
0 comments:
Post a Comment