SlideShare une entreprise Scribd logo
1  sur  25
Bluetooth Security
          Mechanisms
                       Hochschule der Medien
                             Computer Science and Media

                                Mobile Security
                               Marvin Hoffmann (B.Sc.)



contact@marvin-hoffmann.de                                18. April 2011
Fun-Facts
1. Bluetooth is anglicised for „Blåtand“
  - danish king who was well known for his
     communication skills
2. Bluetooth logo is a bind rune merging
   Hagall and Bjarkan runes, the initials of
   „Harald Blauzahn“
Agenda
1. Bluetooth Technology and Standards
2. Security Mechanisms
3. Weaknesses
 • exloitation and protection
4. Known Attacks
5. Conclusion
1. Bluetooth Technology
•   developed by Ericsson in 1994

•   since 1998 managed by „Bluetooth Special Interest
    Group“ (over 14.000 companies)

•   v1.0a July 1999 // v1.1 in early 2001

•   current Version 4.0 (since December 2009)

•   fully backward compatible to v1.1




                           4
1. Bluetooth Technology
•   uses 2.5 GHz ISM band (Industrial, Scientific,
    Medical) - licence-free worldwide

•   frequence spectrum 2402-2480 MHz
    -   divided into 79 channels, 1 MHz each

•   channel changes 1600 times per second
    -   leads to 625 µs timeslots

    -   determine hopping sequence on connection



                                5
1. Bluetooth Technology
•   Two types of networks

    •   Piconet
                                                     M            S

        -   1 master, up to 255 slaves
            (max. 8 active devices at a time, incl. master) S

    •   Scatternet
        -   consists of two or more Piconets              M               S
                                                                                  P

                                                                      S

                                                                                      P
                                                                              S
                                                              M

                                   6
1. Bluetooth Technology
•   3 classes with different permitted power and range

•   minimum distance 10cm


                            permitted power                  range *
                                (mW)                           (m)
         not
    recommended
                  Class 1            100                      100

    recommended   Class 2            2.5                       10

    recommended   Class 3              1                       1
                            * ranges under best conditions


                            7
1. Bluetooth Technology
   •   evolution of data rates and features


                  v1.1              v1.2                v2.0            v3.0              v4.0
                 (02.2001)         (11.2003)            (11.2004)       (04.2009)         (12.2009)


                                                                       up to 24        still 2,1 / 24
 data-rate     732,2 KBit/s        1 MBit/s           2,1 MBit/s        MBit/s             MBit/s
                                                                      (peer-to-peer)


                                    Adaptive
               Received Signal                                        high speed
                                   Frequency-         Enhanced Data                     Bluetooth low
new features      Strength
                                 Hopping spread        Rate (EDR)
                                                                      channel on
                                                                                       energy protocol
                 Indication                                           WLAN basis
                                 spectrum (AFH)



                                                  8
1. Bluetooth Technology
•   the 4 different states when setting up a connection


      Inquiry                            Page




      Standby                         Connected


                          9
1. Bluetooth Technology
•   Inquiry
    -   master sending on different frequences (changing all 3.12µs)

    -   slave scanning on different frequences (changing all 1.28µs)

    -   synchronisation of channelhops

    -   switching to „Page“-mode


•   Page                                       Inquiry                   Page


    -   calculating hopping-sequence
        including unique hardware-ID
        of the master device
                                               Standby                 Connected
    -   switching to „Connected“-mode

                                       10
1. Bluetooth Technology
•   Connected
    -   synchronous frequency-hopping

    -   using pattern settled in page mode

•   Standby
    -   no communication
                                      Inquiry     Page

    -   energy saving


                                     Standby    Connected



                               11
1. Bluetooth Technology
•   pairing process
                          random number
       M                                          S

                          acknowledgement
       M                                          S
                      random number + PIN +
       M              masters Bluetooth address   S
                              (simplified)

                         XOR combination
       M                  and verification         S

                               :) / :(
       M                     session key          S
                                  12
2. Security Mechanisms
•   frequence hopping
    -   master and slaves within a Piconet know
        the hopping-sequence

    -   attacker does not

•   limited range
    -   class 2 or class 3 should be used (class 2 most common)

    -   turn off when in public or connection not required




                               13
2. Security Mechanisms
•   optional pre-shared key authentication and
    encryption algorithms

•   strength of security relies primarily on length and
    randomness of the passkey used for pairing

•   discoverability and connectability
    -   control whether remote Bluetooth devices are able to
        find and connect to a local Bluetooth device

•   optional user authorization for incoming


                               14
3. Weaknesses
•   hidden phones can be scanned

•   PIN authentication is weak (BF attack possible when
    PIN too simple)
    -   save pin -> no PIN authentication required again

    -   PIN should be more then 8 characters
        (16 characters possible / 128bit)

    -   be careful when reauthentication requested

•   fix and often weak PINs in devices without keyboard

                                15
3. Weaknesses

„According to the Bluetooth specification, PINs can be
8-128 bits long. Unfortunately, most manufacturers have
standardized on a four decimal-digit PIN. This attack can
crack that 4-digit PIN in less than 0.3 sec on an old
Pentium III 450MHz computer, and in 0.06 sec on a
Pentium IV 3Ghz HT computer.“
Bruce Schneier (June 2005)




                             16
3. Weaknesses
•   unit keys: one shared key with all trusted units
    -   trusted units can impersonate the unit distributing the key

    -   no protection against trusted units



•   not all attacks need to know frequence-sequence

•   scanner that listens on all 79 channels can spy
    hopping-sequence



                                17
3. Weaknesses
•   3 security modes
    -   mode 1: no encryption : (

    -   mode 2: activated by application - therefore possibly off : (

    -   mode 3: always on : )




                                 18
4. Known Attacks
•   BlueJacking
    -   sending vCard contact, containing a message as name

•   BlueSnarfing
    -   allows access to calendar, contact list, emails and text-
        messages

    -   patched in newer Bluetooth standards

•   BlueBug
    -   calls, SMS, phonebook, forward calls, www, use provider, ...


                                 19
4. Known Attacks
•   CommWarrior
    -   presented by Jörg last week

•   Location Tracking
    -   can be used for advertising combined with Bluejacking

•   DOS attack
    -   e.g. stop device to switch in energy-saving standby mode




                                20
5. Conclusion
•   most dangerous in crowded, public places due to
    limited range of class 2 devices

•   hiding the phone does not protect completely, but
    increases effort dramatically

•   relatively secure technology
    -   depends highly on implementation of manufacturer
        (chosen class, security mode, build in PIN, etc.)




                               21
5. Recommendations
•   pairing process at secure place

•   choose strong PIN

•   turn off completely when not in use

•   at least hide your phone




                          22
Questions?
Discussion!
Sources
•   Hochschule der Medien Stuttgart
    Mathias Leidecker und Alexander Ultsch: Bluetooth Sicherheitsanalyse

•   HU Berlin - Dipl.-Inf. J. Richling: Drahtlose Kommunikation (Teil 2)
    http://www2.informatik.hu-berlin.de/~richling/emes2003/10-wireless.pdf


•   Systems and Network Analysis Center / Information Assurance Directorate:
    Bluetooth Security

•   Offical Bluetooth Technology Web Site
    http://www.bluetooth.com/


•   Wikipedia
    http://de.wikipedia.org/wiki/Bluetooth
    http://en.wikipedia.org/wiki/Bluetooth

•   Bruce Schneier: Schneier.com
    http://www.schneier.com/blog/archives/2005/06/attack_on_the_b_1.html
Sources
•   Internet-Sicherheit.de
    http://www.internet-sicherheit.de/service/glossar/eintrag/eintrag-detail/bluetooth-pairing/


•   Shmoo.com: Bluesniff - The next wardriving frontier
    http://bluesniff.shmoo.com/
    http://www.shmoo.com/~gdead/dc-11-brucepotter.ppt


•   PC Games Hardware (Bluetooth Logo)
    http://www.pcgameshardware.de/screenshots/original/2009/04/Bluetooth_LOGO.gif

Contenu connexe

Tendances

Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energySaptadeep Pal
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITYJay Nagar
 
Bluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internalsBluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internalsDavy Jacops
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationguest664c3f
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technologyDavid Livingston J
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Vijay Kribpz
 
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYVikas Jagtap
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologyRohit Roy
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth securityRamasubbu .P
 
WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth Sana Alvi
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYAJAL A J
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejackingAkshita Pillai
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networksBrockanurag
 

Tendances (20)

Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energy
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
 
Bluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internalsBluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internals
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2
 
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGY
 
Blue1
Blue1Blue1
Blue1
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

En vedette

Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyManish Sharma
 
Hacking the Internet of Things
Hacking the Internet of ThingsHacking the Internet of Things
Hacking the Internet of ThingsMike Hagedorn
 
Makler-Umfrage zum Bestellerprinzip und der Mietpreisbremse
Makler-Umfrage zum Bestellerprinzip und der MietpreisbremseMakler-Umfrage zum Bestellerprinzip und der Mietpreisbremse
Makler-Umfrage zum Bestellerprinzip und der MietpreisbremseImmobilienScout24
 
HDR_Hydroqual_selenium_brochure
HDR_Hydroqual_selenium_brochureHDR_Hydroqual_selenium_brochure
HDR_Hydroqual_selenium_brochureJohn Sondey
 
Ley 2320 creación Fernández Alonso
Ley 2320 creación Fernández AlonsoLey 2320 creación Fernández Alonso
Ley 2320 creación Fernández AlonsoDoctora Edilicia
 
Estrategias de mercadeo uc 6
Estrategias de mercadeo uc 6Estrategias de mercadeo uc 6
Estrategias de mercadeo uc 6Ricardo Herrera
 
Termes La Garriga
Termes La Garriga Termes La Garriga
Termes La Garriga Laura
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth VulnerabilitiesVictorYee
 
Survey of Rater Training Programs
Survey of Rater Training ProgramsSurvey of Rater Training Programs
Survey of Rater Training ProgramsC. Allen Gorman
 
¿ Triibuto a la belleza de carabajo -¿
 ¿ Triibuto a la belleza de carabajo -¿ ¿ Triibuto a la belleza de carabajo -¿
¿ Triibuto a la belleza de carabajo -¿tomasvila
 
Manual de Comunicaciones
Manual de ComunicacionesManual de Comunicaciones
Manual de ComunicacionesLu Esqueche
 
Revista Culturism nr. 116 (2/2001)
Revista Culturism nr. 116 (2/2001)Revista Culturism nr. 116 (2/2001)
Revista Culturism nr. 116 (2/2001)Redis Nutritie
 

En vedette (20)

Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth PPT Report
Bluetooth PPT ReportBluetooth PPT Report
Bluetooth PPT Report
 
Carwhisperer Bluetooth Attack
Carwhisperer Bluetooth AttackCarwhisperer Bluetooth Attack
Carwhisperer Bluetooth Attack
 
Hacking the Internet of Things
Hacking the Internet of ThingsHacking the Internet of Things
Hacking the Internet of Things
 
Makler-Umfrage zum Bestellerprinzip und der Mietpreisbremse
Makler-Umfrage zum Bestellerprinzip und der MietpreisbremseMakler-Umfrage zum Bestellerprinzip und der Mietpreisbremse
Makler-Umfrage zum Bestellerprinzip und der Mietpreisbremse
 
HDR_Hydroqual_selenium_brochure
HDR_Hydroqual_selenium_brochureHDR_Hydroqual_selenium_brochure
HDR_Hydroqual_selenium_brochure
 
Ley 2320 creación Fernández Alonso
Ley 2320 creación Fernández AlonsoLey 2320 creación Fernández Alonso
Ley 2320 creación Fernández Alonso
 
Revista Cores Reportagens
Revista Cores   ReportagensRevista Cores   Reportagens
Revista Cores Reportagens
 
Minsa.tbc 2010
Minsa.tbc 2010Minsa.tbc 2010
Minsa.tbc 2010
 
Bases becas carnet de camion la pobla de vallbona
Bases becas carnet de camion la pobla de vallbonaBases becas carnet de camion la pobla de vallbona
Bases becas carnet de camion la pobla de vallbona
 
Estrategias de mercadeo uc 6
Estrategias de mercadeo uc 6Estrategias de mercadeo uc 6
Estrategias de mercadeo uc 6
 
Top SEO Tools
Top SEO ToolsTop SEO Tools
Top SEO Tools
 
Termes La Garriga
Termes La Garriga Termes La Garriga
Termes La Garriga
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
 
Survey of Rater Training Programs
Survey of Rater Training ProgramsSurvey of Rater Training Programs
Survey of Rater Training Programs
 
¿ Triibuto a la belleza de carabajo -¿
 ¿ Triibuto a la belleza de carabajo -¿ ¿ Triibuto a la belleza de carabajo -¿
¿ Triibuto a la belleza de carabajo -¿
 
Directores 2
Directores 2Directores 2
Directores 2
 
Manual de Comunicaciones
Manual de ComunicacionesManual de Comunicaciones
Manual de Comunicaciones
 
Revista Culturism nr. 116 (2/2001)
Revista Culturism nr. 116 (2/2001)Revista Culturism nr. 116 (2/2001)
Revista Culturism nr. 116 (2/2001)
 
SmilingOne Foundation Annual Report 2012/13
SmilingOne Foundation Annual Report 2012/13SmilingOne Foundation Annual Report 2012/13
SmilingOne Foundation Annual Report 2012/13
 

Similaire à Bluetooth Security

Similaire à Bluetooth Security (20)

Blue tooth
Blue toothBlue tooth
Blue tooth
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
7952034.ppt
7952034.ppt7952034.ppt
7952034.ppt
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Short blutooth present
Short blutooth present Short blutooth present
Short blutooth present
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptxAWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
 

Dernier

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 

Dernier (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Bluetooth Security

  • 1. Bluetooth Security Mechanisms Hochschule der Medien Computer Science and Media Mobile Security Marvin Hoffmann (B.Sc.) contact@marvin-hoffmann.de 18. April 2011
  • 2. Fun-Facts 1. Bluetooth is anglicised for „Blåtand“ - danish king who was well known for his communication skills 2. Bluetooth logo is a bind rune merging Hagall and Bjarkan runes, the initials of „Harald Blauzahn“
  • 3. Agenda 1. Bluetooth Technology and Standards 2. Security Mechanisms 3. Weaknesses • exloitation and protection 4. Known Attacks 5. Conclusion
  • 4. 1. Bluetooth Technology • developed by Ericsson in 1994 • since 1998 managed by „Bluetooth Special Interest Group“ (over 14.000 companies) • v1.0a July 1999 // v1.1 in early 2001 • current Version 4.0 (since December 2009) • fully backward compatible to v1.1 4
  • 5. 1. Bluetooth Technology • uses 2.5 GHz ISM band (Industrial, Scientific, Medical) - licence-free worldwide • frequence spectrum 2402-2480 MHz - divided into 79 channels, 1 MHz each • channel changes 1600 times per second - leads to 625 µs timeslots - determine hopping sequence on connection 5
  • 6. 1. Bluetooth Technology • Two types of networks • Piconet M S - 1 master, up to 255 slaves (max. 8 active devices at a time, incl. master) S • Scatternet - consists of two or more Piconets M S P S P S M 6
  • 7. 1. Bluetooth Technology • 3 classes with different permitted power and range • minimum distance 10cm permitted power range * (mW) (m) not recommended Class 1 100 100 recommended Class 2 2.5 10 recommended Class 3 1 1 * ranges under best conditions 7
  • 8. 1. Bluetooth Technology • evolution of data rates and features v1.1 v1.2 v2.0 v3.0 v4.0 (02.2001) (11.2003) (11.2004) (04.2009) (12.2009) up to 24 still 2,1 / 24 data-rate 732,2 KBit/s 1 MBit/s 2,1 MBit/s MBit/s MBit/s (peer-to-peer) Adaptive Received Signal high speed Frequency- Enhanced Data Bluetooth low new features Strength Hopping spread Rate (EDR) channel on energy protocol Indication WLAN basis spectrum (AFH) 8
  • 9. 1. Bluetooth Technology • the 4 different states when setting up a connection Inquiry Page Standby Connected 9
  • 10. 1. Bluetooth Technology • Inquiry - master sending on different frequences (changing all 3.12µs) - slave scanning on different frequences (changing all 1.28µs) - synchronisation of channelhops - switching to „Page“-mode • Page Inquiry Page - calculating hopping-sequence including unique hardware-ID of the master device Standby Connected - switching to „Connected“-mode 10
  • 11. 1. Bluetooth Technology • Connected - synchronous frequency-hopping - using pattern settled in page mode • Standby - no communication Inquiry Page - energy saving Standby Connected 11
  • 12. 1. Bluetooth Technology • pairing process random number M S acknowledgement M S random number + PIN + M masters Bluetooth address S (simplified) XOR combination M and verification S :) / :( M session key S 12
  • 13. 2. Security Mechanisms • frequence hopping - master and slaves within a Piconet know the hopping-sequence - attacker does not • limited range - class 2 or class 3 should be used (class 2 most common) - turn off when in public or connection not required 13
  • 14. 2. Security Mechanisms • optional pre-shared key authentication and encryption algorithms • strength of security relies primarily on length and randomness of the passkey used for pairing • discoverability and connectability - control whether remote Bluetooth devices are able to find and connect to a local Bluetooth device • optional user authorization for incoming 14
  • 15. 3. Weaknesses • hidden phones can be scanned • PIN authentication is weak (BF attack possible when PIN too simple) - save pin -> no PIN authentication required again - PIN should be more then 8 characters (16 characters possible / 128bit) - be careful when reauthentication requested • fix and often weak PINs in devices without keyboard 15
  • 16. 3. Weaknesses „According to the Bluetooth specification, PINs can be 8-128 bits long. Unfortunately, most manufacturers have standardized on a four decimal-digit PIN. This attack can crack that 4-digit PIN in less than 0.3 sec on an old Pentium III 450MHz computer, and in 0.06 sec on a Pentium IV 3Ghz HT computer.“ Bruce Schneier (June 2005) 16
  • 17. 3. Weaknesses • unit keys: one shared key with all trusted units - trusted units can impersonate the unit distributing the key - no protection against trusted units • not all attacks need to know frequence-sequence • scanner that listens on all 79 channels can spy hopping-sequence 17
  • 18. 3. Weaknesses • 3 security modes - mode 1: no encryption : ( - mode 2: activated by application - therefore possibly off : ( - mode 3: always on : ) 18
  • 19. 4. Known Attacks • BlueJacking - sending vCard contact, containing a message as name • BlueSnarfing - allows access to calendar, contact list, emails and text- messages - patched in newer Bluetooth standards • BlueBug - calls, SMS, phonebook, forward calls, www, use provider, ... 19
  • 20. 4. Known Attacks • CommWarrior - presented by Jörg last week • Location Tracking - can be used for advertising combined with Bluejacking • DOS attack - e.g. stop device to switch in energy-saving standby mode 20
  • 21. 5. Conclusion • most dangerous in crowded, public places due to limited range of class 2 devices • hiding the phone does not protect completely, but increases effort dramatically • relatively secure technology - depends highly on implementation of manufacturer (chosen class, security mode, build in PIN, etc.) 21
  • 22. 5. Recommendations • pairing process at secure place • choose strong PIN • turn off completely when not in use • at least hide your phone 22
  • 24. Sources • Hochschule der Medien Stuttgart Mathias Leidecker und Alexander Ultsch: Bluetooth Sicherheitsanalyse • HU Berlin - Dipl.-Inf. J. Richling: Drahtlose Kommunikation (Teil 2) http://www2.informatik.hu-berlin.de/~richling/emes2003/10-wireless.pdf • Systems and Network Analysis Center / Information Assurance Directorate: Bluetooth Security • Offical Bluetooth Technology Web Site http://www.bluetooth.com/ • Wikipedia http://de.wikipedia.org/wiki/Bluetooth http://en.wikipedia.org/wiki/Bluetooth • Bruce Schneier: Schneier.com http://www.schneier.com/blog/archives/2005/06/attack_on_the_b_1.html
  • 25. Sources • Internet-Sicherheit.de http://www.internet-sicherheit.de/service/glossar/eintrag/eintrag-detail/bluetooth-pairing/ • Shmoo.com: Bluesniff - The next wardriving frontier http://bluesniff.shmoo.com/ http://www.shmoo.com/~gdead/dc-11-brucepotter.ppt • PC Games Hardware (Bluetooth Logo) http://www.pcgameshardware.de/screenshots/original/2009/04/Bluetooth_LOGO.gif

Notes de l'éditeur

  1. 3 Runde Sicherheit Mobiler Systeme\ndie meisten aus MI Bachelor / erstes Semester CSM\nfolgefragen gerne per mail\nbevor wir starten; namensgebung .. zähne, blau\n
  2. herrschte im 10. JH und hat Dänemark weitgehend christianisiert\nwar bekannt für seine Kommunikationsfähigkeit\nauch Logo Hommage an ihn\nEricsson und Nokia\n
  3. Thema ist in Rahmenprogramm eingebettet\n1. Keine Grundlagen im Bachelor / RN2 / Merle / wichtig für Vortrag\n2. Mechanismen zum Schutz\n3. Aufspüren und Ausnutzung von Schwachstellen / Schutz\n4. Jörg\n5. Zusammenfassung und Blick in die Zukunft\n
  4. Entwicklung als Alternative zu Kabel und IR (Sichtkontakt)\nSpecial Interest Group veröffentlicht die Standards (3Com, Ericsson, IBM, Intel, Microsoft, Motorola, Nokia und Toshiba)\nv1.0 a und b sehr buggy / marktgerecht v1.1\nalle versionen rückwärtskompatibel zu 1.1\nfeatures wie enhanced data rate 2.0 // Highspeed kanal (wlan p2p) // low energy (kurze übertragungs aufbauzeit) 4.0\n
  5. außerdem im Spektrum: WLAN, Schnurlostelefone, Mikrowellenherd\nguardband zu anderen frequenzbereichen\nfrequence hopping als sicherheitsmechanismus\n
  6. Time-Multiplexing\nGerät kann nur Master in einem Piconet sein\nGeräte können mehreren Scatternets angehören\nDatenrate leidet erheblich in Scatternets\nPiconets werden durch unterschiedliche Frequency-Hopping Folgen identifiziert\n
  7. Je kleiner die Reichweite, desto kleiner die Wahrs. Opfer eines Angriffes zu werden\nPAN\nsendeleistung class 2 und 3 gesünder :)\nclass 2 am häufigsten genutzt.. zB auch bei handys\nBluetooth low energy reduziert verbrauch auf 1/2 bis zu 1/100\n
  8. v1.1 wie gesagt erste marktfähige version\nv1.2 afh:\nv2 schnellere übertragung\nv3 high speed kanal zusätzlich. basis rate immer noch bei 2,1mbit/s\nv4 low energy senkt energieverbrauch auf 1/2 bis 1/100\n
  9. 4 Modi in denen sich ein gerät befinden kann\ninquiry mode = such modus\npage mode = verbindungaufbau\n
  10. – Master sendet auf einer definierten Frequenz-Sequenz Signale im 3.12μs Muster\n– Wartet auf Rückmeldung\n– Slave scannt gleiche Frequenzfolge im 1.28μs Muster\n– Durch unterschiedliche Hoppingfrequenzen findet Treffen mit hoher Wahrscheinlichkeit in kurzer Zeit statt\n– Slave sendet Informationen über seine Systemtaktung\n– Synchronisation des Channelhops\n– Wechsel nach Page-Mode\n
  11. \n
  12. \n
  13. \n
  14. \n
  15. 1. bruteforce ganzer adressbereich / erste drei bytes hersteller code / trotzdem zu lange\n2. ebenfalls bruteforce möglich bei schwachem pin\n3. headsets oder ähnliche geräte ohne tastatur haben festen, sehr oft sehr schwachen pin\n
  16. 1. bruteforce ganzer adressbereich / erste drei bytes hersteller code / trotzdem zu lange\n2. ebenfalls bruteforce möglich bei schwachem pin\n3. headsets oder ähnliche geräte ohne tastatur haben festen, sehr oft sehr schwachen pin\n
  17. unit keys: alle angemeldeten geräte teilen sich einen key\nsomit können authorisierte geräte nun das andere gerät imitieren, da sie den unit key kennen und dessen adresse\ngeräte müssen aber einmal authorisiert sein\n
  18. \n
  19. - bluejack harmlos\n- Die Bluesnarfing-Attacke wird eingesetzt um Bluetooth Geräte wie Mobiltelefone auszusionieren. Es lassen sich Daten aus dem Gerät auslesen, ohne dass der Besitzer dies wahrnehmen kann. Das Entscheidende hierbei ist, dass für die Datenübertragung keine Kopplung der Geräte erfolgt.\n- bluebug nicht nur ausspionieren, sondern auch zufügen von (finanziellem) schaden\n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n