Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.
References
Bluebugging. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, from http://trifinite.org /trifinite_stuff_bluebug.html
Bluejacking. (2009, January 6). Wikipedia. Retrieved January 27, 20909, from http://en.wikipedia.org/wiki/Bluejacking
Bluesmack. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, fromhttp://trifinite.org /trifinite_stuff_bluesmack.html
BlueSnarf. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, from http://trifinite.org /trifinite_stuff_bluesnarf.html
Bluesnarfing. (n.d.). Bluejacking Tools: The Biggest Collection of Bluetooth Tools on the Internet Web site. Retrieved January 27, 2009, from http://www.bluejackingtools.com /bluesnarfing/
Bluetooth SIG. (2008a). How Bluetooth Technology Works. Bluetooth.com Web site. Retrieved January 6, 2009, from http://www.bluetooth.com/Bluetooth/Technology/Works/ Bluetooth SIG. (2008b). Security. Bluetooth.com Web site. Retrieved January 6, 2009, from http://www.bluetooth.com/Bluetooth/Technology/Works/Security/
D3scene. (2008, April 30). BTInfo. Retrieved January 29, 2009, from http://www.d3scene.com /forum/general-mp/13279-btinfo.html
E-Stealth.com. (2008). Ultimate Bluetooth Mobile Phone Spy Software User Manual. Retrieved January 29, 2009, from http://www.jamsa.us/inventory/UltimateMobilePhoneSpyManual.pdf
Getjar. (2008, March 10). STM Bluetooth Software and Tools. Retrieved January 29, 2009, from http://www.getjar.com/products/8042/STMBlueS
Gusev, A. (n.d.). Object Exchange (OBEX) Protocol Primer. Developer.com Web site. Retrieved January 29, 2009, from http://www.developer.com/ws/article.php/3573636
Helomoto. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, from http://trifinite.org /trifinite_stuff_helomoto.html
Hole, K.J. (2007, March 2). Bluetooth -- Part 3: Link Controller and JSR-82 API Architecture. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth3alt.pdf
Hole, K.J. (2008a, February 24). Bluetooth -- Part 1: Overview. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BTPDF/Bluetooth1alt.pdf
Hole, K.J. (2008b, March 8). Bluetooth -- Part 10: Introduction to Wireless Security. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-PDF/Bluetooth10alt.pdf
Hole, K.J. (2008c, March 8). Bluetooth -- Part 4: Link Manager and J2ME Programming. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth4alt.pdf
Hole, K.J. (2008d, March 11). Bluetooth -- Part 6: Logical Link Control and Adaptation Protocol. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth6alt.pdf
Hole, K.J. (2008e, March 23). Bluetooth -- Part 7: RFCOMM. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BTPDF/Bluetooth7alt.pdf
Hole, K.J. (2008f, March 29). Bluetooth -- Part 8: The JSR-82 API for Device Discovery. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth8alt.pdf
Java Community Process (JCP). (2009). JSR 82: Java APIs for Bluetooth. Community Development of Java Technology Specifications Web site. Retrieved January 27, 2009, from http://jcp.org/en/jsr/detail?id=82
Jansen, W., & Scarfone, K. (2008, October). Guidelines on Cell Phone and PDA Security. National Institute of Standards and Technology Special Publication 800-124. Retrieved February 24, 2009, from http://csrc.nist.gov/publications/nistpubs/800-124/SP800-124.pdf
Laurie, A., Holtmann, M., & Herfurt, M. (2006, March 30). Bluetooth Hacking. WEBSEC 2006, London, U.K. Retrieved January 27, 2009, from http://trifinite.org/Downloads /trifinite.presentation_websec2006.pdf
Mahmoud, Q.H. (2003a, February). Wireless Application Programming With J2ME and Bluetooth. Sun Developer Network (SDN) Web site. Retrieved January 27, 2009, from http://developers.sun.com/mobility/midp/articles/bluetooth1/
Mahmoud, Q.H. (2003b, April). Part II: The Java APIs for Bluetooth Wireless Technology. Sun Developer Network (SDN) Web site. Retrieved January 7, 2009, from http://developers.sun.com /mobility/midp/articles/bluetooth2/
SE-NSE. (2006, November 5).MiyuX. se-nse v5 Web site. Retrieved January 29, 2009, from http://forums.se-nse.net/index.php?showtopic=5653
Sridhar, T. (2008, December). Wi-Fi, Bluetooth, and WiMAX. The IP Journal, 11(4), 2-17.
Tutorial-Reports.com. (n.d.). Bluetooth Tutorial: Protocol Stack. Retrieved January 28, 2009, from http://www.tutorial-reports.com/wireless/bluetooth/protocolstack.php
Recommended Citation
Browning, Dennis and Kessler, Gary C.
(2009)
"Bluetooth Hacking: A Case Study,"
Journal of Digital Forensics, Security and Law: Vol. 4
, Article 4.
DOI: https://doi.org/10.15394/jdfsl.2009.1058
Available at:
https://commons.erau.edu/jdfsl/vol4/iss2/4
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons