Posted 17 July 2012 - 10:22 AM
Posted 17 July 2012 - 07:39 PM
I've been on a roll with new projects lately, and just came into possession of a bluetooth adapter for my laptop. I fired the thing up, used apt-get to find some software, and have been playing with some bt tools such as hcitool, hcidump, sdptool, etc for about a day or two now. I've seen a few different attacks involving older bt devices e.g. bluebugging for running at commands, bluesnarfing for sniffing. My question is, has bluetooth been implemented in a more proper manner since then, that these types of attacks wouldn't be effective on the modern bt device? I attempted to Bluebug my Motorola Triumph (running CM7), but there was no serial port or headset (I don't use bt personally) and thus I figured I wouldn't have an attack vector. I then attempted my old phone, an LG Rumor Touch, and found similar results. If anyone has any insight into this, I'd love to hear all the gory details. Also, I'm thinking about writing a bash script to automate the bluebugging/bluesnarfing process, I'll post it when I get the chance/if any of you would be interested.
This is not my area of expertise but I do know bt5 has a suite of bluetooth pen testing software
Posted 22 July 2012 - 11:06 AM
Edited by TheFunk, 22 July 2012 - 11:08 AM.
BinRev is hosted by the great people at Lunarpages!