Bluetooth is a very common thing for mobile technology and used frequntly by user to tranfer data. But as frequent they transfer the data , less they put attention on security . Even most of them donot think about that their mobile can be hacked via blutooth.
So now from today i am going to describe about blutooth hackings and security and it will continue in upcoming post.
Bluejacking, Bluesnarfing, Bluebugging and Bluetoothing are the main type of bluetooth hacks.
Bluejacking is the simplest of the four. It is an attempt to send a phone contact or business card to another nearby phone. The ‘name' field of the contact can be misused by replacing it with a suggestive text so that the target device reads it as a part of intimation query displayed on its screen. Tis is somewhat equivalent to spam e-mail because both are unsolicited messages displayed on recipients' end without consent, and by exploiting the inherent nature of communication.
These are the softwares available in the market which help in bluetooth hacking.
BlueScanner - It hunts out for Bluetooth devices and dig out much amount of information of the newly discovered device.
BlueSniff - Utility for discovering hidden Bluetooth devices.
BlueBugger -It simply exploits the BlueBug vulnerability of the bluetooth enabled devices. By exploiting these vulnerabilities and leakes, you can gain access to the phone-book, calls lists and other information of the bluetooth device.
BTBrowser - Is a Bluetooth Browser is a J2ME app. which can browse and explore all the surrounding Bluetooth devices.
BTCrawler -It is a Bluetooth scanner for Windows Mobile based devices. It can implement BlueJacking and BlueSnarfing attacks.
In the next post i will describe how hackers actually use these softwares for the hacking..........
MOBILE HACKING:BLUTOOTH HACKING
7:28 AM
ethical hacking fundamental, hacking stuff, internet security, internet security solutions, mobile security, network security, security
No comments
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment