SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Carwhisperer
Bluetooth Attack
What is Bluetooth??
• Bluetooth is “A specification for short-range radio
  links between mobile phones, mobile computers,
  digital cameras, and other portable devices.”
• Enables users to establish ad hoc networks
  supporting voice and data communications
History



• It has been called after Harald Blatand (Harald
  bluetooth), the king of Denmark.
• The Bluetooth wireless technology was invented in
  1994 by Ericsson
• In September 1998, the Bluetooth Special Interest
  Group (SIG) was founded with the objective of
  developing the Bluetooth wireless technology
Bluetooth Basics

• Bluetooth operates in the licensed-free ISM band
  between 2.4 and 2.48 GHz.
• For Prevention of interference with other devices working
  within ISM, Bluetooth make use of a technique called
  frequency hopping.
• It takes 1600 hops/sec
• It has 79 base band frequencies
• Bluetooth is a connection oriented service.
Bluetooth Basics(Continued)

• In order to connect two Bluetooth devices, one of them,
  normally the device initiating the connection, elevates to
  the master, leaving the second device as a slave.
• Piconet
• Scatternet
• ACL (Asynchronous connection-oriented) and SCO
  (Synchronous connection-less)
• Data rates up to 3 Mb/s
• Typical communication range is 10 to100 meters
Bluetooth Topology (ACL link)
Bluetooth Topology (SCO/eSCO link)
Master-Slave Architecture




• In Bluetooth, connections with up to seven devices,
  which form piconet are possible, where communication is
  led by the master device.
Bluetooth Services

• Bluetooth makes use of a protocol stack, which makes it
  simple to separate application logic from physical data
  connections.

• The protocol architecture of Bluetooth allows for straight
  forward implementation of existing network protocols
  like HTTP, FTP, etc.
Bluetooth Radio & Baseband
• Bluetooth Radio work as a digital signal processing
  component of the system
• Bluetooth device transmit data, which is made up of bits
  (ones and zeros), over a radio frequency
• Baseband processes the signal received and transmitted
  by Radio
• Controls links, packets, error and flow
LMP & HCI
• LMP manages link setup, authentication, link
  configuration and other low level protocols
• Connection establishment
• HCI provides command interface to the baseband
  controller and link manager
• Exists across three sections, the host, transport layer and
  the host controller
L2CAP & RFCOMM
• L2CAP provides connection-oriented and connection-
  less data services to upper layer protocols
• Permits protocols and applications to transmit and
  receive data packets up to 64 kilobytes in length
• RFCOMM protocol supports 60 simultaneous connection
  between two Bluetooth devices
• The number of connections that can be used
  simultaneously in a bluetooth device is implementation
  specific, meaning what profile is being used
SDP-Service Discovery Protocol

• Bluetooth is a technology, which is deployed in a
  dynamical environment. Devices may get out of range or
  even switched on, while new devices might become
  activated.

• In order to detect services, provided by other devices, a
  protocol, which detects services makes sense. In
  Bluetooth, the Service Discovery Protocol is responsible
  for keeping track of services, provided within a device’s
  operating range
TCS - Telephony Control Protocol

• The Telephony Control Protocol provides functionality to
  control telephony applications and makes use of L2CAP
  connections.
OBEX - Object Exchange Protocol

• The Object Exchange Protocol (OBEX) provides services
  for the exchange of binary data objects. To initiate an
  OBEX session, an optional OBEX authentication is
  possible.



• Therefore, a limited set of commands like PUT, GET or
  ABORT exist for easy file transfers, comparable to HTTP.
Bluetooth Profiles

• In Bluetooth, provided services are composed to a
  Bluetooth Profile. Bluetooth devices communicate via the
  profiles, that act as ”interfaces”.

• For further consideration, two Bluetooth profiles are
  especially interesting, concerning BlueSnarfing and
  BlueBugging attacks:
   1. OBEX Object Push Profile (OPP).
   2. Synchronisation Profile (SYNCH).
OBEX Object Push Profile (OPP)

• The Object Push Profile (OPP) provides basic functions
  for exchange of binary objects, mainly used for vCards in
  Bluetooth.

• vCard is a file format standard for electronic business
  cards.

• Since vCards are not worth being especially protected, no
  authorization procedure is performed before OPP
  transactions. Supported OBEX commands are connect,
  disconnect, put , get and abort.
Synchronization Profile (SYNCH)

• The Synchronization Profile (SYNCH) provides functions
  for exchange of Personal Information Manager (PIM)
  data and was adopted from the IrDA infrared
  specification.



• In Bluetooth, especially private data, like the address
  book, calendar, etc. is sent using the SYNCH profile.
Overview On Bluetooth Security

• Security within Bluetooth itself covers three major
  areas:
      – Authentication
      – Authorization
      – Encryption

• Security levels:
      – Silent
      – Private
      – Public
Thank You !!

Contenu connexe

Tendances

Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQAlan Percy
 
Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energySaptadeep Pal
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentationjogiparthyramya
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Redes - Camada Enlace
Redes - Camada EnlaceRedes - Camada Enlace
Redes - Camada EnlaceLuiz Arthur
 
Presentation on wireless communication
Presentation on wireless communicationPresentation on wireless communication
Presentation on wireless communicationHapPy SumOn
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & SecurityHimangshu Hazra
 
Time and Phase Delivery
Time and Phase DeliveryTime and Phase Delivery
Time and Phase DeliveryADVA
 

Tendances (20)

Telecom Security
Telecom SecurityTelecom Security
Telecom Security
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
 
Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energy
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Redes - Camada Enlace
Redes - Camada EnlaceRedes - Camada Enlace
Redes - Camada Enlace
 
Presentation on wireless communication
Presentation on wireless communicationPresentation on wireless communication
Presentation on wireless communication
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
49778140 projeto-de-rede
49778140 projeto-de-rede49778140 projeto-de-rede
49778140 projeto-de-rede
 
Zte Corporation
Zte CorporationZte Corporation
Zte Corporation
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
MPLS
MPLS MPLS
MPLS
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Firewall
FirewallFirewall
Firewall
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Time and Phase Delivery
Time and Phase DeliveryTime and Phase Delivery
Time and Phase Delivery
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

En vedette

Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7gnkeshava
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth VulnerabilitiesVictorYee
 
About BLE server profile
About BLE server profile About BLE server profile
About BLE server profile Lin Steven
 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementationStanley Chang
 
Attacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocolAttacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocolCysinfo Cyber Security Community
 
Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1 Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1 NFC Forum
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Securityh_marvin
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyFReeze FRancis
 
Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2NFC Forum
 

En vedette (10)

Hijacking bluetooth headsets
Hijacking bluetooth headsetsHijacking bluetooth headsets
Hijacking bluetooth headsets
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
 
About BLE server profile
About BLE server profile About BLE server profile
About BLE server profile
 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementation
 
Attacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocolAttacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocol
 
Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1 Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
 
Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2
 

Similaire à Carwhisperer Bluetooth Attack

Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technologySuman Bhattacharyya
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesMukesh Chinta
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basicEngr Sid
 
SEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotSEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotKamonasish Hore
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.pptssuser1d7ef1
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetoothSonali Parab
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindikvsevindik
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in BluetoothSonali Parab
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layersJay Nagar
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfshubhangisonawane6
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetoothvish0110
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Bit Hacker
 

Similaire à Carwhisperer Bluetooth Attack (20)

Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
SEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotSEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth Hotspot
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layers
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
MC Module 4.docx
MC Module 4.docxMC Module 4.docx
MC Module 4.docx
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20
 

Plus de n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Plus de n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Dernier

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Dernier (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

Carwhisperer Bluetooth Attack

  • 2. What is Bluetooth?? • Bluetooth is “A specification for short-range radio links between mobile phones, mobile computers, digital cameras, and other portable devices.” • Enables users to establish ad hoc networks supporting voice and data communications
  • 3. History • It has been called after Harald Blatand (Harald bluetooth), the king of Denmark. • The Bluetooth wireless technology was invented in 1994 by Ericsson • In September 1998, the Bluetooth Special Interest Group (SIG) was founded with the objective of developing the Bluetooth wireless technology
  • 4. Bluetooth Basics • Bluetooth operates in the licensed-free ISM band between 2.4 and 2.48 GHz. • For Prevention of interference with other devices working within ISM, Bluetooth make use of a technique called frequency hopping. • It takes 1600 hops/sec • It has 79 base band frequencies • Bluetooth is a connection oriented service.
  • 5. Bluetooth Basics(Continued) • In order to connect two Bluetooth devices, one of them, normally the device initiating the connection, elevates to the master, leaving the second device as a slave. • Piconet • Scatternet • ACL (Asynchronous connection-oriented) and SCO (Synchronous connection-less) • Data rates up to 3 Mb/s • Typical communication range is 10 to100 meters
  • 8. Master-Slave Architecture • In Bluetooth, connections with up to seven devices, which form piconet are possible, where communication is led by the master device.
  • 9. Bluetooth Services • Bluetooth makes use of a protocol stack, which makes it simple to separate application logic from physical data connections. • The protocol architecture of Bluetooth allows for straight forward implementation of existing network protocols like HTTP, FTP, etc.
  • 10.
  • 11. Bluetooth Radio & Baseband • Bluetooth Radio work as a digital signal processing component of the system • Bluetooth device transmit data, which is made up of bits (ones and zeros), over a radio frequency • Baseband processes the signal received and transmitted by Radio • Controls links, packets, error and flow
  • 12. LMP & HCI • LMP manages link setup, authentication, link configuration and other low level protocols • Connection establishment • HCI provides command interface to the baseband controller and link manager • Exists across three sections, the host, transport layer and the host controller
  • 13. L2CAP & RFCOMM • L2CAP provides connection-oriented and connection- less data services to upper layer protocols • Permits protocols and applications to transmit and receive data packets up to 64 kilobytes in length • RFCOMM protocol supports 60 simultaneous connection between two Bluetooth devices • The number of connections that can be used simultaneously in a bluetooth device is implementation specific, meaning what profile is being used
  • 14. SDP-Service Discovery Protocol • Bluetooth is a technology, which is deployed in a dynamical environment. Devices may get out of range or even switched on, while new devices might become activated. • In order to detect services, provided by other devices, a protocol, which detects services makes sense. In Bluetooth, the Service Discovery Protocol is responsible for keeping track of services, provided within a device’s operating range
  • 15. TCS - Telephony Control Protocol • The Telephony Control Protocol provides functionality to control telephony applications and makes use of L2CAP connections.
  • 16. OBEX - Object Exchange Protocol • The Object Exchange Protocol (OBEX) provides services for the exchange of binary data objects. To initiate an OBEX session, an optional OBEX authentication is possible. • Therefore, a limited set of commands like PUT, GET or ABORT exist for easy file transfers, comparable to HTTP.
  • 17. Bluetooth Profiles • In Bluetooth, provided services are composed to a Bluetooth Profile. Bluetooth devices communicate via the profiles, that act as ”interfaces”. • For further consideration, two Bluetooth profiles are especially interesting, concerning BlueSnarfing and BlueBugging attacks: 1. OBEX Object Push Profile (OPP). 2. Synchronisation Profile (SYNCH).
  • 18. OBEX Object Push Profile (OPP) • The Object Push Profile (OPP) provides basic functions for exchange of binary objects, mainly used for vCards in Bluetooth. • vCard is a file format standard for electronic business cards. • Since vCards are not worth being especially protected, no authorization procedure is performed before OPP transactions. Supported OBEX commands are connect, disconnect, put , get and abort.
  • 19. Synchronization Profile (SYNCH) • The Synchronization Profile (SYNCH) provides functions for exchange of Personal Information Manager (PIM) data and was adopted from the IrDA infrared specification. • In Bluetooth, especially private data, like the address book, calendar, etc. is sent using the SYNCH profile.
  • 20. Overview On Bluetooth Security • Security within Bluetooth itself covers three major areas: – Authentication – Authorization – Encryption • Security levels: – Silent – Private – Public
  • 21.
  • 22.
  • 23.
  • 24.