•  
  •  
 

Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

References

Bluebugging. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, from http://trifinite.org /trifinite_stuff_bluebug.html

Bluejacking. (2009, January 6). Wikipedia. Retrieved January 27, 20909, from http://en.wikipedia.org/wiki/Bluejacking

Bluesmack. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, fromhttp://trifinite.org /trifinite_stuff_bluesmack.html

BlueSnarf. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, from http://trifinite.org /trifinite_stuff_bluesnarf.html

Bluesnarfing. (n.d.). Bluejacking Tools: The Biggest Collection of Bluetooth Tools on the Internet Web site. Retrieved January 27, 2009, from http://www.bluejackingtools.com /bluesnarfing/

Bluetooth SIG. (2008a). How Bluetooth Technology Works. Bluetooth.com Web site. Retrieved January 6, 2009, from http://www.bluetooth.com/Bluetooth/Technology/Works/ Bluetooth SIG. (2008b). Security. Bluetooth.com Web site. Retrieved January 6, 2009, from http://www.bluetooth.com/Bluetooth/Technology/Works/Security/

D3scene. (2008, April 30). BTInfo. Retrieved January 29, 2009, from http://www.d3scene.com /forum/general-mp/13279-btinfo.html

E-Stealth.com. (2008). Ultimate Bluetooth Mobile Phone Spy Software User Manual. Retrieved January 29, 2009, from http://www.jamsa.us/inventory/UltimateMobilePhoneSpyManual.pdf

Getjar. (2008, March 10). STM Bluetooth Software and Tools. Retrieved January 29, 2009, from http://www.getjar.com/products/8042/STMBlueS

Gusev, A. (n.d.). Object Exchange (OBEX) Protocol Primer. Developer.com Web site. Retrieved January 29, 2009, from http://www.developer.com/ws/article.php/3573636

Helomoto. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, from http://trifinite.org /trifinite_stuff_helomoto.html

Hole, K.J. (2007, March 2). Bluetooth -- Part 3: Link Controller and JSR-82 API Architecture. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth3alt.pdf

Hole, K.J. (2008a, February 24). Bluetooth -- Part 1: Overview. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BTPDF/Bluetooth1alt.pdf

Hole, K.J. (2008b, March 8). Bluetooth -- Part 10: Introduction to Wireless Security. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-PDF/Bluetooth10alt.pdf

Hole, K.J. (2008c, March 8). Bluetooth -- Part 4: Link Manager and J2ME Programming. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth4alt.pdf

Hole, K.J. (2008d, March 11). Bluetooth -- Part 6: Logical Link Control and Adaptation Protocol. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth6alt.pdf

Hole, K.J. (2008e, March 23). Bluetooth -- Part 7: RFCOMM. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BTPDF/Bluetooth7alt.pdf

Hole, K.J. (2008f, March 29). Bluetooth -- Part 8: The JSR-82 API for Device Discovery. Retrieved January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth8alt.pdf

Java Community Process (JCP). (2009). JSR 82: Java APIs for Bluetooth. Community Development of Java Technology Specifications Web site. Retrieved January 27, 2009, from http://jcp.org/en/jsr/detail?id=82

Jansen, W., & Scarfone, K. (2008, October). Guidelines on Cell Phone and PDA Security. National Institute of Standards and Technology Special Publication 800-124. Retrieved February 24, 2009, from http://csrc.nist.gov/publications/nistpubs/800-124/SP800-124.pdf

Laurie, A., Holtmann, M., & Herfurt, M. (2006, March 30). Bluetooth Hacking. WEBSEC 2006, London, U.K. Retrieved January 27, 2009, from http://trifinite.org/Downloads /trifinite.presentation_websec2006.pdf

Mahmoud, Q.H. (2003a, February). Wireless Application Programming With J2ME and Bluetooth. Sun Developer Network (SDN) Web site. Retrieved January 27, 2009, from http://developers.sun.com/mobility/midp/articles/bluetooth1/

Mahmoud, Q.H. (2003b, April). Part II: The Java APIs for Bluetooth Wireless Technology. Sun Developer Network (SDN) Web site. Retrieved January 7, 2009, from http://developers.sun.com /mobility/midp/articles/bluetooth2/

SE-NSE. (2006, November 5).MiyuX. se-nse v5 Web site. Retrieved January 29, 2009, from http://forums.se-nse.net/index.php?showtopic=5653

Sridhar, T. (2008, December). Wi-Fi, Bluetooth, and WiMAX. The IP Journal, 11(4), 2-17.

Tutorial-Reports.com. (n.d.). Bluetooth Tutorial: Protocol Stack. Retrieved January 28, 2009, from http://www.tutorial-reports.com/wireless/bluetooth/protocolstack.php

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.