SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Carwhisperer
Bluetooth Attack
What is Bluetooth??
• Bluetooth is “A specification for short-range radio
  links between mobile phones, mobile computers,
  digital cameras, and other portable devices.”
• Enables users to establish ad hoc networks
  supporting voice and data communications
History



• It has been called after Harald Blatand (Harald
  bluetooth), the king of Denmark.
• The Bluetooth wireless technology was invented in
  1994 by Ericsson
• In September 1998, the Bluetooth Special Interest
  Group (SIG) was founded with the objective of
  developing the Bluetooth wireless technology
Bluetooth Basics

• Bluetooth operates in the licensed-free ISM band
  between 2.4 and 2.48 GHz.
• For Prevention of interference with other devices working
  within ISM, Bluetooth make use of a technique called
  frequency hopping.
• It takes 1600 hops/sec
• It has 79 base band frequencies
• Bluetooth is a connection oriented service.
Bluetooth Basics(Continued)

• In order to connect two Bluetooth devices, one of them,
  normally the device initiating the connection, elevates to
  the master, leaving the second device as a slave.
• Piconet
• Scatternet
• ACL (Asynchronous connection-oriented) and SCO
  (Synchronous connection-less)
• Data rates up to 3 Mb/s
• Typical communication range is 10 to100 meters
Bluetooth Topology (ACL link)
Bluetooth Topology (SCO/eSCO link)
Master-Slave Architecture




• In Bluetooth, connections with up to seven devices,
  which form piconet are possible, where communication is
  led by the master device.
Bluetooth Services

• Bluetooth makes use of a protocol stack, which makes it
  simple to separate application logic from physical data
  connections.

• The protocol architecture of Bluetooth allows for straight
  forward implementation of existing network protocols
  like HTTP, FTP, etc.
Bluetooth Radio & Baseband
• Bluetooth Radio work as a digital signal processing
  component of the system
• Bluetooth device transmit data, which is made up of bits
  (ones and zeros), over a radio frequency
• Baseband processes the signal received and transmitted
  by Radio
• Controls links, packets, error and flow
LMP & HCI
• LMP manages link setup, authentication, link
  configuration and other low level protocols
• Connection establishment
• HCI provides command interface to the baseband
  controller and link manager
• Exists across three sections, the host, transport layer and
  the host controller
L2CAP & RFCOMM
• L2CAP provides connection-oriented and connection-
  less data services to upper layer protocols
• Permits protocols and applications to transmit and
  receive data packets up to 64 kilobytes in length
• RFCOMM protocol supports 60 simultaneous connection
  between two Bluetooth devices
• The number of connections that can be used
  simultaneously in a bluetooth device is implementation
  specific, meaning what profile is being used
SDP-Service Discovery Protocol

• Bluetooth is a technology, which is deployed in a
  dynamical environment. Devices may get out of range or
  even switched on, while new devices might become
  activated.

• In order to detect services, provided by other devices, a
  protocol, which detects services makes sense. In
  Bluetooth, the Service Discovery Protocol is responsible
  for keeping track of services, provided within a device’s
  operating range
TCS - Telephony Control Protocol

• The Telephony Control Protocol provides functionality to
  control telephony applications and makes use of L2CAP
  connections.
OBEX - Object Exchange Protocol

• The Object Exchange Protocol (OBEX) provides services
  for the exchange of binary data objects. To initiate an
  OBEX session, an optional OBEX authentication is
  possible.



• Therefore, a limited set of commands like PUT, GET or
  ABORT exist for easy file transfers, comparable to HTTP.
Bluetooth Profiles

• In Bluetooth, provided services are composed to a
  Bluetooth Profile. Bluetooth devices communicate via the
  profiles, that act as ”interfaces”.

• For further consideration, two Bluetooth profiles are
  especially interesting, concerning BlueSnarfing and
  BlueBugging attacks:
   1. OBEX Object Push Profile (OPP).
   2. Synchronisation Profile (SYNCH).
OBEX Object Push Profile (OPP)

• The Object Push Profile (OPP) provides basic functions
  for exchange of binary objects, mainly used for vCards in
  Bluetooth.

• vCard is a file format standard for electronic business
  cards.

• Since vCards are not worth being especially protected, no
  authorization procedure is performed before OPP
  transactions. Supported OBEX commands are connect,
  disconnect, put , get and abort.
Synchronization Profile (SYNCH)

• The Synchronization Profile (SYNCH) provides functions
  for exchange of Personal Information Manager (PIM)
  data and was adopted from the IrDA infrared
  specification.



• In Bluetooth, especially private data, like the address
  book, calendar, etc. is sent using the SYNCH profile.
Overview On Bluetooth Security

• Security within Bluetooth itself covers three major
  areas:
      – Authentication
      – Authorization
      – Encryption

• Security levels:
      – Silent
      – Private
      – Public
Thank You !!

Contenu connexe

Tendances

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
Aeman Khan
 

Tendances (20)

bluejacking
bluejackingbluejacking
bluejacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Blue1
Blue1Blue1
Blue1
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

En vedette

Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
h_marvin
 

En vedette (10)

Hijacking bluetooth headsets
Hijacking bluetooth headsetsHijacking bluetooth headsets
Hijacking bluetooth headsets
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
 
About BLE server profile
About BLE server profile About BLE server profile
About BLE server profile
 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementation
 
Attacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocolAttacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocol
 
Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1 Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
 
Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2
 

Similaire à Carwhisperer Bluetooth Attack

Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
Ayesha Saeed
 
SEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotSEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth Hotspot
Kamonasish Hore
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
Sonali Parab
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
Sonali Parab
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
vish0110
 

Similaire à Carwhisperer Bluetooth Attack (20)

Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
SEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotSEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth Hotspot
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layers
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
MC Module 4.docx
MC Module 4.docxMC Module 4.docx
MC Module 4.docx
 

Plus de n|u - The Open Security Community

Plus de n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Dernier

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Dernier (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Carwhisperer Bluetooth Attack

  • 2. What is Bluetooth?? • Bluetooth is “A specification for short-range radio links between mobile phones, mobile computers, digital cameras, and other portable devices.” • Enables users to establish ad hoc networks supporting voice and data communications
  • 3. History • It has been called after Harald Blatand (Harald bluetooth), the king of Denmark. • The Bluetooth wireless technology was invented in 1994 by Ericsson • In September 1998, the Bluetooth Special Interest Group (SIG) was founded with the objective of developing the Bluetooth wireless technology
  • 4. Bluetooth Basics • Bluetooth operates in the licensed-free ISM band between 2.4 and 2.48 GHz. • For Prevention of interference with other devices working within ISM, Bluetooth make use of a technique called frequency hopping. • It takes 1600 hops/sec • It has 79 base band frequencies • Bluetooth is a connection oriented service.
  • 5. Bluetooth Basics(Continued) • In order to connect two Bluetooth devices, one of them, normally the device initiating the connection, elevates to the master, leaving the second device as a slave. • Piconet • Scatternet • ACL (Asynchronous connection-oriented) and SCO (Synchronous connection-less) • Data rates up to 3 Mb/s • Typical communication range is 10 to100 meters
  • 8. Master-Slave Architecture • In Bluetooth, connections with up to seven devices, which form piconet are possible, where communication is led by the master device.
  • 9. Bluetooth Services • Bluetooth makes use of a protocol stack, which makes it simple to separate application logic from physical data connections. • The protocol architecture of Bluetooth allows for straight forward implementation of existing network protocols like HTTP, FTP, etc.
  • 10.
  • 11. Bluetooth Radio & Baseband • Bluetooth Radio work as a digital signal processing component of the system • Bluetooth device transmit data, which is made up of bits (ones and zeros), over a radio frequency • Baseband processes the signal received and transmitted by Radio • Controls links, packets, error and flow
  • 12. LMP & HCI • LMP manages link setup, authentication, link configuration and other low level protocols • Connection establishment • HCI provides command interface to the baseband controller and link manager • Exists across three sections, the host, transport layer and the host controller
  • 13. L2CAP & RFCOMM • L2CAP provides connection-oriented and connection- less data services to upper layer protocols • Permits protocols and applications to transmit and receive data packets up to 64 kilobytes in length • RFCOMM protocol supports 60 simultaneous connection between two Bluetooth devices • The number of connections that can be used simultaneously in a bluetooth device is implementation specific, meaning what profile is being used
  • 14. SDP-Service Discovery Protocol • Bluetooth is a technology, which is deployed in a dynamical environment. Devices may get out of range or even switched on, while new devices might become activated. • In order to detect services, provided by other devices, a protocol, which detects services makes sense. In Bluetooth, the Service Discovery Protocol is responsible for keeping track of services, provided within a device’s operating range
  • 15. TCS - Telephony Control Protocol • The Telephony Control Protocol provides functionality to control telephony applications and makes use of L2CAP connections.
  • 16. OBEX - Object Exchange Protocol • The Object Exchange Protocol (OBEX) provides services for the exchange of binary data objects. To initiate an OBEX session, an optional OBEX authentication is possible. • Therefore, a limited set of commands like PUT, GET or ABORT exist for easy file transfers, comparable to HTTP.
  • 17. Bluetooth Profiles • In Bluetooth, provided services are composed to a Bluetooth Profile. Bluetooth devices communicate via the profiles, that act as ”interfaces”. • For further consideration, two Bluetooth profiles are especially interesting, concerning BlueSnarfing and BlueBugging attacks: 1. OBEX Object Push Profile (OPP). 2. Synchronisation Profile (SYNCH).
  • 18. OBEX Object Push Profile (OPP) • The Object Push Profile (OPP) provides basic functions for exchange of binary objects, mainly used for vCards in Bluetooth. • vCard is a file format standard for electronic business cards. • Since vCards are not worth being especially protected, no authorization procedure is performed before OPP transactions. Supported OBEX commands are connect, disconnect, put , get and abort.
  • 19. Synchronization Profile (SYNCH) • The Synchronization Profile (SYNCH) provides functions for exchange of Personal Information Manager (PIM) data and was adopted from the IrDA infrared specification. • In Bluetooth, especially private data, like the address book, calendar, etc. is sent using the SYNCH profile.
  • 20. Overview On Bluetooth Security • Security within Bluetooth itself covers three major areas: – Authentication – Authorization – Encryption • Security levels: – Silent – Private – Public
  • 21.
  • 22.
  • 23.
  • 24.