SlideShare a Scribd company logo
+
Bluetooh – Please just turn it off
! "! "! "! "
"
Yeah
Who we are ? – Hippies
Kevin Finistere
Former Head of Research of SNOSoft
Found Vulnerabilities in Apple, IBM, SAP,
Oracle, Symantec…
Has contributed a lot to this talk
Not here today
Thierry Zoller
Welcome home
Security Consultant @ N.runs
Found vulnerabilities in Checkpoint, Symantec,
Citrix, F-Secure, MySQL4, MacAfee, Nod32…
Don‘t like to talk about me, see for yourself.
Batteries not inlcuded.
Mad Hax0r
The Goal of this Talk ?
The Goal of this talk is not to:
Build myths
Show off – and not show how
The Goal of this talk is to :
Raise awareness
Make risks transparent
Paradigm Shift – Bluetooth is not only for toys
Clear the air about InqTana
What are we talking about today ?
[ 0x00 ] – Introduction : What is Bluetooth ?
How does it work and hold together ?
Security Modes, Paring modes
Scatternets, Piconets..
What‘s the difference to WiFi (802.11a/b/g) ?
Common Implementations of the Protocol
[ 0x01 ] – Get ready to rumble : Extending the Range
Extending the range of Bluetooth devices
Building automated reconnaissance and attack devices
Bluetooth War driving (GPS, 360°Camera)
More..
[ 0x02 ] – Attack! : Getting dirty with it
Attacking Mobile Phones / Handhelds / PDAs
Attacking Cars / Headsets / Free Hands kits
Attacking Internal Networks (0day)
Attacking the Protocol, braking the encryption (0day)
Tracking the un-trakeable and more..
[ 0x00 ] Introduction
What is Bluetooth ?
Invented 1995 by Ericsson, SIG formed 1998 (Bluetooth Special
Interest Group )
Bluetooth 1.0 - 1.7.1999, first devices sold in mid 2000
Named after “Harald Blauzahn”
Goal was, low-cost “cable replacement”
Personal Area Networks
Tech Specs
2.400-2.4835 GHz (WiFi, Cameras, etc..)
Frequency Hopping, up to 3200 times
per second ! (1600 in connection state)
[ 0x00 ] Introduction
The difference and similarities with WiFi :
Operate on the same ISM band : 2,4Ghz
WiFi 11 Channels, Bluetooth 79 Channels
Both do frequency hopping (WiFi 600 times slower)
WiFi broadcasts it’s presence every x ms
Bluetooth is a complete Framework with
Profiles and layers of protocols
Obvious: Range
[ 0x00 ] Introduction
What does it do for me ?
Cable Replacement
Data/Voice
Personal Area Networks
[ 0x00 ] Introduction
The foundation – Protocol Stack
Hardware
Software
[ 0x00 ] Introduction
The Bluetooth Profiles
Represent a group and defines mandatory options
Prevent compatibility issues, modular approach to BT extensions
Vertical representation of BT layer usage, handled through SDP
Object Push Profile
[ 0x00 ] Introduction
Typical Bluetooth Scenario (1)
Simplistic Model (ignoring security for now)
1 - User goes into a lobby and wants to read email
2 - Clicks on the PDA Email application
3 - Sends and receives Email
[ 0x00 ] Introduction
Typical Bluetooth Scenario (2)
Inquiry
Inquiry response
Paging (FHS)
Link establishment
Discovers
Profiles
Bluetooth
Access Point
[ 0x00 ] Introduction
Piconets / Scatternets
A Piconet can hold 7 active (and 255 parked) slaves and 1 master,
PTP and PTMP
Master
Slaves
Piconet 1 Piconet 3
Piconet 2
[ 0x00 ] Introduction
Frequency Hopping
Slaves always sync to the Master
Hop up-to 3200 times a second over 79
channels using 625 s length
Piconet agrees to a Sequence based on the
BD_ADDR and Clockoffset of the master.
(Now THIS is a unique fingerprint)
This procedure called “Paging” in Bluetoohesque
FH is the reason you can not easily sniff these BT connections.
You have to sync to the Master (or use a Spectral Analyzer and
reconstruct afterwards – Good luck)
[ 0x00 ] Introduction
Discoverable modes :
Discoverable :
Sends inquiry responses to all inquiries.
Limited discoverable:
Visible for a certain period of time (Implementation bugs..)
Non-Discoverable:
Never answers an inquiry scan (in theory)
Pairing modes :
Non-pairable mode :
Rejects every pairing request (LMP_not_accepted) (Plantronics)
Pairable mode :
Will pair up-on request
[ 0x01 ] Get ready to rumble
Extending the Range
[ 0x01 ] Get ready to rumble
Extending the Range
Class 3
Class 2
Class 1
Home Grown
10 M
25 M
100 M
788 M
Specification defines 3 classes :
- Class 1 - 100 mW (20 dBm)
- Class 2 - 2.5 mW (4 dBm)
- Class 3 - 1 mW (0 dBm)
Up to 2,6km are possible
Home Grown
[ 0x01 ] Get ready to rumble
HOW-TO
Modify class 1 dongle to accept
an aftermarket antenna.
Basic soldering skills required
Provides much more flexibility when
testing
Connects to an Laptop that
supports USB
Instant Ownage
[ 0x01 ] Get ready to rumble
Long Distance - Datasets
Antrum Lake, water reflection
guarantees longer ranges.
788 Meter !
An old Man stole my phone
during this test! I tracked
him with the yagi.
[ 0x01 ] Get ready to rumble
Long Distance - Datasets
Strassen, Luxembourg
550 Meter
Thanks Jerome Carrère
[ 0x01 ] Get ready to rumble
Long Distance - More More
New World record attempt
by Kevin
Use of high precision Trimble
GPS receivers will be used.
DGPS data correction for
centimeter accuracy
2,6 km !
Needs narrow antenna beam
[ 0x01 ] Get ready to rumble
Optimizing for Penetration (1)
Integrated Linksys Dongle
Integrated USB Cable
Metal Parabola
10 * Zoom
Laser (to be done)
[ 0x01 ] Get ready to rumble
Optimizing for Penetration (2)
Bundling (Parabola)
Higher penetration through walls
Glass is your friend
On board embedded device. (NSLU2)
Auto scan and attack toolkit
Experiment : Went through a building
found the device on the other side IN
another building.
[ 0x01 ] Get ready to rumble
PerimeterWatch – Bluetooth Wardriving
Perl Script by KF
Searches Bluetooth Devices
Takes 360°pictures
GPS coordinates
[ 0x02 ] Attack !
Attacking Bluetooth Devices – Bypassing security
[ 0x02 ] Attack !
Menu du Jour :
Bluebug (AT over RFCOMM)
Bluesnarf (Obex)
Car Whisperer
Limited time, sorry..
Some 0-day :
Owning internal Networks over Bluetooth
Attacking the Protocol:
Bluecrack - BT Pin and Link key cracker
Widcomm Overflow (Broadcom merger leaves lots of vuln users that
can not patch) BTW 3.0.1.905 (../ attacks) and up to BTW 1.4.2.10
has (overflows)
[ 0x01 ] Get ready to rumble
Luxembourg – 1 hour Bluetooth Scan
Boulevard Royal
295 unique discoverable
Bluetooth devices
Lots of vulnerable ones
[ 0x01 ] Get ready to rumble
Luxembourg – 1 hour Bluetooth Scan
00:0E:9F - Audi UHV – Pin 1234
Nokia 6310 - Disaster
[ 0x02 ] Attack !
Implementation - Issues Galore
Pairing always enabled
Rare – few devices
Headsets (Plantronix) – Pairing Button is useless
Default Pins (0000, 1111 …)
Discovery enabled
Lots of Devices
Siemens T60 – stays in discover mode if you ping it, might be attacked
forever.
Hidden (non advertised) Services
ObexIRDA, etc Nokia, others..
[ 0x02 ] Attack !
Bluebug Attack – Trifinite Group
The Service that shouldn’t be there
Read phonebook
Read / Send SMS
Dial Number
Redirect Calls
Etc…
Vulnerable devices :
Nokia 6310, Nokia 6310i, Nokia 8910i, Nokia 8910, T68, Sony Ericsson
T68i, T610, T68, T68i, R520m, T610, Z1010, Z600, Motorola V80, V5xx,
V6xx and E398 and others…
[ 0x02 ] Attack !
Bluesnarf Attack – Trifinite Group
Basically a “get” request over OBEX Push
Obex Push usually not authenticated
Request for known files, telecom/pb.vcf
Vulnerable devices :
Nokia 6310, Nokia 6310i, Nokia 6650, Ericsson T610, Ericsson
T68, Ericsson T68i, Ericsson T630, Ericsson Z600 others…
Give me your phonebook
Ok
[ 0x02 ] Attack !
CarWhisperer – Martin Herfurt
Listen and Record Conversations
Eavesdrop on Headsets, Hands-Free kits
Works against Widcomm < BTW 4.0.1.1500
with no pincode required!
Root Cause :
Paring mode, discoverable, hard coded Pin.
[ 0x02 ] Attack !
Wireless Keyboards
If HID server (PC) accepts connections, you
might remotely control the PC. (Collin R. Mulliner)
If you have the link key :
- decryption of packets i.e. capture the keystrokes.
- connect to the PC and remotely control it
[ 0x02 ] Attack !
The PIN is not really that useful
The link key is !
Here’s why :
Protocol 1.2 Authentication :
[ 0x02 ] Attack ! – 0day
InqTana - Setting the Record straight
Kevin created a cribbled PoC Worm
named InqTana
It’s real, it’s here and it’s not an invention
of the AV industry, KF handed it over in order
for them to protect you against these types of
attacks.
ObexFTP server directory traversal exploit,malicious InputManager
and a local root exploit = remote login tty over rfcomm
NO user interaction required
Media completely missed the point and invented an obscure
conspiracy theory
Points were :
- Macs are NOT invulnerable (the flaw is patched now)
- You can own internal networks over Bluetooth
[ 0x02 ] Attack ! – 0day
Obex ../../../ - Owning internal networks
Apple
OSX 10.3 Tiger
OSX 10.4 Jaguar
Vanilla, delayed release
Windows
Widcomm, Toshiba,
Bluesoil, others ?
Pocket PC
Kevin: Apple asked me to not tell 10.4 was shipping vulnerable
OSX 10.3.9 patched, OSX 10.4 shipped vulnerable patched a month
after OSX 10.3.9
[ 0x02 ] Attack ! – 0day
MAC OS 10.3 & 10.4 Vanilla
Multi-Staged attack :
Step 1 – ObexFTP ../../../ Attack
Step 2 – Using Input Manager launches Root exploit
(then binds getty to the pda sync port)
Step 3 – Connecting to Port 3 over Rfcomm
Step 4 – Harvesting Keys
Step 5 – Owning the network,
scanning for other BT devices,
compromising them.
[ 0x02 ] Attack ! – 0day
MAC OS 10.3 & 10.4 Vanilla
Multi-Staged attack :
Spoofing the BD_Address of the Apple and
authenticating through stolen link key.
[ 0x02 ] Attack ! – 0day
Transposed to a Company
Server Room
Workstations
[ 0x02 ] Attack ! – 0day
Get the Code
For Hack.lu, Inqtana code release :
http://www.digitalmunition.com
Presented also in the upcoming Hacking Exposed : Wireless
[ 0x02 ] Attack !
BUT – The misconception vault
we have an USB policy
BT is only 10 meters
we have automatic patches
we have preset policies disabling all Wireless devices
Your internal networks are at risk.
Implement Mitigation / Monitoring
RFProtect and similar Products
[ 0x02 ] Attack ! – 0day
Introducing BTCrack
Hack.lu release
Cracks PIN and Linkkey
Requires values from a Pairing sniff
We can force repairing by using
various Methods
Based on the research
of Shaked and Wool
4 digits pin – 0,25 seconds
[ 0x02 ] Attack ! – 0day
Introducing BTCrack
[ 0x02 ] Attack ! – 0day
BT Crack – Behind the scenes (1)
Pairing
Step1
Generates (RAND)
K = E22(RAND, PIN, PIN_LEN)
Device A Device B
Step1
K = E22(RAND, PIN, PIN_LEN)
Rand
Step2
Generates (RANDA)
CA = RANDA xor K
Step2
Generates (RANDB)
CB = RANDB xor K
CA
CB
Step3
RANDB=CA xor K
LKA=E21(RANDA, ADDRA)
LKB=E21(RANDB,ADDRB)
LKAB=LKA xor LKB
Step3
RANDB=CA xor K
LKA=E21(RANDA, ADDRA)
LKB=E21(RANDB,ADDRB)
LKAB=LKA xor LKB
Step4
SRESA =
E1(CH_RANDA,ADDRB,LKAB)
Step4
SRESB =
E1(CH_RANDA,ADDRB,LKAB)
CH_RANDA
SRESB
Step5
SRESA = SRESB
E22 = Connection key
E21 = Device key
[ 0x02 ] Attack ! – 0day
BT Crack – Behind the scenes
Right : Shaked and Wool logic
Bottom: Pseudo code by Tomasz Rybicki
Pin =-1;
Do
{
PIN++;
CR_K=E22(RAND, PIN, length(PIN));
CR_RANDA = CA xor CR_K;
CR_RANDB = CB xor CR_K;
CR_LKA = E21 (CR_RANDA, ADDRA);
CR_LKB = E21 (CR_RANDB, ADDRB);
CR_LKAB = CR_LKA xor CR_LKB;
CR_SRES = (CH_RAND, ADDRB, CR_LKAB);
}
while (CR_SRES == SRES)
Hackin9 04/2005 - Tomasz Rybicki
[ 0x02 ] Attack ! – 0day
BT Crack – Demo
[ 0x02 ] Attack ! – 0day
BT Crack – Download
Give me a bit of time to fix the bugs
Will be available at http://www.nruns.com
[ 0x02 ] Attack !
Windows Widcomm - Buffer overflows
Video
http://www.digitalmunition.com/Widcomm.avi
File
Vulnerable versions
Widcomm Stack up to 3.x is vuln
Widcomm BTStackServer 1.4.2 .10
Widcomm BTStackServer 1.3.2 .7
Widcomm Bluetooth Communication Software 1.4.1 .03
HP IPAQ 2215
HP IPAQ 5450
[ 0x02 ] Attack !
Windows Widcomm - Buffer overflows
[ 0x02 ] Attack ! – 0day
Owning the Secret Service ? ;)
MicroEarpiece – worlds smallest
Goes into the ear Tunnel
Jabra Headset - Pin Code : 0000
Seriously: You can get it at MicroEarPiece.com
Not discoverable, not in Pairing mode, got it yesterday evening, no time
[ 0x02 ] Attack !
Things to Remember :
Bluetooth might be a risk for your Company
Don’t accept every file you are being send, just click NO.
Disable Bluetooth if not required
Pair in “secure” places (SIG Recommendations)
Hold your Bluetooth vendor accountable for vulnerabilities!

More Related Content

What's hot

IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
Zoltan Balazs
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
Open Knowledge Nepal
 
Hacking wireless networks
Hacking wireless networksHacking wireless networks
Hacking wireless networks
Sahil Rai
 
A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!
edwardo
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
Vi Tính Hoàng Nam
 
Hacking RF based IoT devices
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devices
Erez Metula
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
Suraj Bohara
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
SensePost
 
wifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slidesguest1c1a9a
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
Anton Chuvakin
 
Attack presentation
Attack presentationAttack presentation
Attack presentation
Frikha Nour
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
Prakashchand Suthar
 
Brst – Border Router Security Tool
Brst – Border Router Security ToolBrst – Border Router Security Tool
Brst – Border Router Security Tool
tleroy0928
 
Mozilla chirimen firefox os dwika v5
Mozilla chirimen firefox os dwika v5Mozilla chirimen firefox os dwika v5
Mozilla chirimen firefox os dwika v5
Dwika Sudrajat
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
saloni mittal
 
Brute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected SetupBrute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected SetupScientia Groups
 
2018 all lens bag of tricks v1.2
2018 all lens bag of tricks v1.22018 all lens bag of tricks v1.2
2018 all lens bag of tricks v1.2
Len Noe
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
Rob Gillen
 
Sergio González - WiFiSlax 4.0 [RootedCON 2010]
Sergio González - WiFiSlax 4.0 [RootedCON 2010]Sergio González - WiFiSlax 4.0 [RootedCON 2010]
Sergio González - WiFiSlax 4.0 [RootedCON 2010]
RootedCON
 

What's hot (20)

IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 
Hacking wireless networks
Hacking wireless networksHacking wireless networks
Hacking wireless networks
 
A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
 
Hacking RF based IoT devices
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devices
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
wifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slides
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Attack presentation
Attack presentationAttack presentation
Attack presentation
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Brst – Border Router Security Tool
Brst – Border Router Security ToolBrst – Border Router Security Tool
Brst – Border Router Security Tool
 
Mozilla chirimen firefox os dwika v5
Mozilla chirimen firefox os dwika v5Mozilla chirimen firefox os dwika v5
Mozilla chirimen firefox os dwika v5
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Brute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected SetupBrute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected Setup
 
2018 all lens bag of tricks v1.2
2018 all lens bag of tricks v1.22018 all lens bag of tricks v1.2
2018 all lens bag of tricks v1.2
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
 
Sergio González - WiFiSlax 4.0 [RootedCON 2010]
Sergio González - WiFiSlax 4.0 [RootedCON 2010]Sergio González - WiFiSlax 4.0 [RootedCON 2010]
Sergio González - WiFiSlax 4.0 [RootedCON 2010]
 

Similar to All your Bluetooth is belong to us - the rest too.

Hacking Backtrak Mobile
Hacking Backtrak MobileHacking Backtrak Mobile
Hacking Backtrak Mobile
Novizul Evendi
 
Bluetooth
BluetoothBluetooth
Bluetooth
Fahim Faysal
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
Slawomir Jasek
 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet
NoNameCon
 
Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266
Akash Thakur
 
Node home automation with Node.js and MQTT
Node home automation with Node.js and MQTTNode home automation with Node.js and MQTT
Node home automation with Node.js and MQTT
Michael Dawson
 
Ride the Light
Ride the LightRide the Light
SIGFOX Makers Tour - Porto
SIGFOX Makers Tour - PortoSIGFOX Makers Tour - Porto
SIGFOX Makers Tour - Porto
Nicolas Lesconnec
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR
 
How to save home PCs for being Zombies ?
How to save home PCs for being Zombies ?How to save home PCs for being Zombies ?
How to save home PCs for being Zombies ?
Pascal Kotté (ICT-a.ch, CloudReady, LiN, Tech4good)
 
L2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICES
L2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICESL2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICES
L2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICES
Faelix Ltd
 
The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?
SecuRing
 
Enterprise Developer Journey to the IoT
Enterprise Developer Journey to the IoTEnterprise Developer Journey to the IoT
Enterprise Developer Journey to the IoT
Burr Sutter
 
Hijacking bluetooth headsets
Hijacking bluetooth headsetsHijacking bluetooth headsets
Hijacking bluetooth headsets
n|u - The Open Security Community
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
Pranshu Pareek
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
AJAL A J
 
SIGFOX Makers Tour - Dublin
SIGFOX Makers Tour - DublinSIGFOX Makers Tour - Dublin
SIGFOX Makers Tour - Dublin
Nicolas Lesconnec
 
Introduction to Home Automation
Introduction to Home AutomationIntroduction to Home Automation
Introduction to Home Automation
Ruslan Ulanov
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoguy
 

Similar to All your Bluetooth is belong to us - the rest too. (20)

Hacking Backtrak Mobile
Hacking Backtrak MobileHacking Backtrak Mobile
Hacking Backtrak Mobile
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet
 
Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266
 
Node home automation with Node.js and MQTT
Node home automation with Node.js and MQTTNode home automation with Node.js and MQTT
Node home automation with Node.js and MQTT
 
Ride the Light
Ride the LightRide the Light
Ride the Light
 
SIGFOX Makers Tour - Porto
SIGFOX Makers Tour - PortoSIGFOX Makers Tour - Porto
SIGFOX Makers Tour - Porto
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
How to save home PCs for being Zombies ?
How to save home PCs for being Zombies ?How to save home PCs for being Zombies ?
How to save home PCs for being Zombies ?
 
L2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICES
L2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICESL2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICES
L2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICES
 
The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?
 
Enterprise Developer Journey to the IoT
Enterprise Developer Journey to the IoTEnterprise Developer Journey to the IoT
Enterprise Developer Journey to the IoT
 
Hijacking bluetooth headsets
Hijacking bluetooth headsetsHijacking bluetooth headsets
Hijacking bluetooth headsets
 
L2 Attacks.pdf
L2 Attacks.pdfL2 Attacks.pdf
L2 Attacks.pdf
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
SIGFOX Makers Tour - Dublin
SIGFOX Makers Tour - DublinSIGFOX Makers Tour - Dublin
SIGFOX Makers Tour - Dublin
 
Introduction to Home Automation
Introduction to Home AutomationIntroduction to Home Automation
Introduction to Home Automation
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology Workshop
 

More from Thierry Zoller

BLtouch marlin configuration
BLtouch marlin configurationBLtouch marlin configuration
BLtouch marlin configuration
Thierry Zoller
 
Neo coolcam - smart-plug user guide v2 - Zwave
Neo coolcam  - smart-plug user guide v2 - ZwaveNeo coolcam  - smart-plug user guide v2 - Zwave
Neo coolcam - smart-plug user guide v2 - Zwave
Thierry Zoller
 
Cansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depth
Thierry Zoller
 
Heise Security - Scheunentor Bluetooth
Heise Security - Scheunentor BluetoothHeise Security - Scheunentor Bluetooth
Heise Security - Scheunentor Bluetooth
Thierry Zoller
 
Hack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to usHack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to us
Thierry Zoller
 
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendationsManaging Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Thierry Zoller
 
IPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash CourseIPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash Course
Thierry Zoller
 
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
Thierry Zoller
 
SSL Audit - The SSL / TLS Scanner
SSL Audit -  The SSL / TLS ScannerSSL Audit -  The SSL / TLS Scanner
SSL Audit - The SSL / TLS Scanner
Thierry Zoller
 
The TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explainedThe TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explained
Thierry Zoller
 

More from Thierry Zoller (10)

BLtouch marlin configuration
BLtouch marlin configurationBLtouch marlin configuration
BLtouch marlin configuration
 
Neo coolcam - smart-plug user guide v2 - Zwave
Neo coolcam  - smart-plug user guide v2 - ZwaveNeo coolcam  - smart-plug user guide v2 - Zwave
Neo coolcam - smart-plug user guide v2 - Zwave
 
Cansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depth
 
Heise Security - Scheunentor Bluetooth
Heise Security - Scheunentor BluetoothHeise Security - Scheunentor Bluetooth
Heise Security - Scheunentor Bluetooth
 
Hack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to usHack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to us
 
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendationsManaging Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendations
 
IPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash CourseIPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash Course
 
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
 
SSL Audit - The SSL / TLS Scanner
SSL Audit -  The SSL / TLS ScannerSSL Audit -  The SSL / TLS Scanner
SSL Audit - The SSL / TLS Scanner
 
The TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explainedThe TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explained
 

Recently uploaded

Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 

Recently uploaded (20)

Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 

All your Bluetooth is belong to us - the rest too.

  • 1. +
  • 2. Bluetooh – Please just turn it off ! "! "! "! " " Yeah
  • 3. Who we are ? – Hippies Kevin Finistere Former Head of Research of SNOSoft Found Vulnerabilities in Apple, IBM, SAP, Oracle, Symantec… Has contributed a lot to this talk Not here today Thierry Zoller Welcome home Security Consultant @ N.runs Found vulnerabilities in Checkpoint, Symantec, Citrix, F-Secure, MySQL4, MacAfee, Nod32… Don‘t like to talk about me, see for yourself. Batteries not inlcuded. Mad Hax0r
  • 4. The Goal of this Talk ? The Goal of this talk is not to: Build myths Show off – and not show how The Goal of this talk is to : Raise awareness Make risks transparent Paradigm Shift – Bluetooth is not only for toys Clear the air about InqTana
  • 5. What are we talking about today ? [ 0x00 ] – Introduction : What is Bluetooth ? How does it work and hold together ? Security Modes, Paring modes Scatternets, Piconets.. What‘s the difference to WiFi (802.11a/b/g) ? Common Implementations of the Protocol [ 0x01 ] – Get ready to rumble : Extending the Range Extending the range of Bluetooth devices Building automated reconnaissance and attack devices Bluetooth War driving (GPS, 360°Camera) More.. [ 0x02 ] – Attack! : Getting dirty with it Attacking Mobile Phones / Handhelds / PDAs Attacking Cars / Headsets / Free Hands kits Attacking Internal Networks (0day) Attacking the Protocol, braking the encryption (0day) Tracking the un-trakeable and more..
  • 6. [ 0x00 ] Introduction What is Bluetooth ? Invented 1995 by Ericsson, SIG formed 1998 (Bluetooth Special Interest Group ) Bluetooth 1.0 - 1.7.1999, first devices sold in mid 2000 Named after “Harald Blauzahn” Goal was, low-cost “cable replacement” Personal Area Networks Tech Specs 2.400-2.4835 GHz (WiFi, Cameras, etc..) Frequency Hopping, up to 3200 times per second ! (1600 in connection state)
  • 7. [ 0x00 ] Introduction The difference and similarities with WiFi : Operate on the same ISM band : 2,4Ghz WiFi 11 Channels, Bluetooth 79 Channels Both do frequency hopping (WiFi 600 times slower) WiFi broadcasts it’s presence every x ms Bluetooth is a complete Framework with Profiles and layers of protocols Obvious: Range
  • 8. [ 0x00 ] Introduction What does it do for me ? Cable Replacement Data/Voice Personal Area Networks
  • 9. [ 0x00 ] Introduction The foundation – Protocol Stack Hardware Software
  • 10. [ 0x00 ] Introduction The Bluetooth Profiles Represent a group and defines mandatory options Prevent compatibility issues, modular approach to BT extensions Vertical representation of BT layer usage, handled through SDP Object Push Profile
  • 11. [ 0x00 ] Introduction Typical Bluetooth Scenario (1) Simplistic Model (ignoring security for now) 1 - User goes into a lobby and wants to read email 2 - Clicks on the PDA Email application 3 - Sends and receives Email
  • 12. [ 0x00 ] Introduction Typical Bluetooth Scenario (2) Inquiry Inquiry response Paging (FHS) Link establishment Discovers Profiles Bluetooth Access Point
  • 13. [ 0x00 ] Introduction Piconets / Scatternets A Piconet can hold 7 active (and 255 parked) slaves and 1 master, PTP and PTMP Master Slaves Piconet 1 Piconet 3 Piconet 2
  • 14. [ 0x00 ] Introduction Frequency Hopping Slaves always sync to the Master Hop up-to 3200 times a second over 79 channels using 625 s length Piconet agrees to a Sequence based on the BD_ADDR and Clockoffset of the master. (Now THIS is a unique fingerprint) This procedure called “Paging” in Bluetoohesque FH is the reason you can not easily sniff these BT connections. You have to sync to the Master (or use a Spectral Analyzer and reconstruct afterwards – Good luck)
  • 15. [ 0x00 ] Introduction Discoverable modes : Discoverable : Sends inquiry responses to all inquiries. Limited discoverable: Visible for a certain period of time (Implementation bugs..) Non-Discoverable: Never answers an inquiry scan (in theory) Pairing modes : Non-pairable mode : Rejects every pairing request (LMP_not_accepted) (Plantronics) Pairable mode : Will pair up-on request
  • 16. [ 0x01 ] Get ready to rumble Extending the Range
  • 17. [ 0x01 ] Get ready to rumble Extending the Range Class 3 Class 2 Class 1 Home Grown 10 M 25 M 100 M 788 M Specification defines 3 classes : - Class 1 - 100 mW (20 dBm) - Class 2 - 2.5 mW (4 dBm) - Class 3 - 1 mW (0 dBm) Up to 2,6km are possible Home Grown
  • 18. [ 0x01 ] Get ready to rumble HOW-TO Modify class 1 dongle to accept an aftermarket antenna. Basic soldering skills required Provides much more flexibility when testing Connects to an Laptop that supports USB Instant Ownage
  • 19. [ 0x01 ] Get ready to rumble Long Distance - Datasets Antrum Lake, water reflection guarantees longer ranges. 788 Meter ! An old Man stole my phone during this test! I tracked him with the yagi.
  • 20. [ 0x01 ] Get ready to rumble Long Distance - Datasets Strassen, Luxembourg 550 Meter Thanks Jerome Carrère
  • 21. [ 0x01 ] Get ready to rumble Long Distance - More More New World record attempt by Kevin Use of high precision Trimble GPS receivers will be used. DGPS data correction for centimeter accuracy 2,6 km ! Needs narrow antenna beam
  • 22. [ 0x01 ] Get ready to rumble Optimizing for Penetration (1) Integrated Linksys Dongle Integrated USB Cable Metal Parabola 10 * Zoom Laser (to be done)
  • 23. [ 0x01 ] Get ready to rumble Optimizing for Penetration (2) Bundling (Parabola) Higher penetration through walls Glass is your friend On board embedded device. (NSLU2) Auto scan and attack toolkit Experiment : Went through a building found the device on the other side IN another building.
  • 24. [ 0x01 ] Get ready to rumble PerimeterWatch – Bluetooth Wardriving Perl Script by KF Searches Bluetooth Devices Takes 360°pictures GPS coordinates
  • 25. [ 0x02 ] Attack ! Attacking Bluetooth Devices – Bypassing security
  • 26. [ 0x02 ] Attack ! Menu du Jour : Bluebug (AT over RFCOMM) Bluesnarf (Obex) Car Whisperer Limited time, sorry.. Some 0-day : Owning internal Networks over Bluetooth Attacking the Protocol: Bluecrack - BT Pin and Link key cracker Widcomm Overflow (Broadcom merger leaves lots of vuln users that can not patch) BTW 3.0.1.905 (../ attacks) and up to BTW 1.4.2.10 has (overflows)
  • 27. [ 0x01 ] Get ready to rumble Luxembourg – 1 hour Bluetooth Scan Boulevard Royal 295 unique discoverable Bluetooth devices Lots of vulnerable ones
  • 28. [ 0x01 ] Get ready to rumble Luxembourg – 1 hour Bluetooth Scan 00:0E:9F - Audi UHV – Pin 1234 Nokia 6310 - Disaster
  • 29. [ 0x02 ] Attack ! Implementation - Issues Galore Pairing always enabled Rare – few devices Headsets (Plantronix) – Pairing Button is useless Default Pins (0000, 1111 …) Discovery enabled Lots of Devices Siemens T60 – stays in discover mode if you ping it, might be attacked forever. Hidden (non advertised) Services ObexIRDA, etc Nokia, others..
  • 30. [ 0x02 ] Attack ! Bluebug Attack – Trifinite Group The Service that shouldn’t be there Read phonebook Read / Send SMS Dial Number Redirect Calls Etc… Vulnerable devices : Nokia 6310, Nokia 6310i, Nokia 8910i, Nokia 8910, T68, Sony Ericsson T68i, T610, T68, T68i, R520m, T610, Z1010, Z600, Motorola V80, V5xx, V6xx and E398 and others…
  • 31. [ 0x02 ] Attack ! Bluesnarf Attack – Trifinite Group Basically a “get” request over OBEX Push Obex Push usually not authenticated Request for known files, telecom/pb.vcf Vulnerable devices : Nokia 6310, Nokia 6310i, Nokia 6650, Ericsson T610, Ericsson T68, Ericsson T68i, Ericsson T630, Ericsson Z600 others… Give me your phonebook Ok
  • 32. [ 0x02 ] Attack ! CarWhisperer – Martin Herfurt Listen and Record Conversations Eavesdrop on Headsets, Hands-Free kits Works against Widcomm < BTW 4.0.1.1500 with no pincode required! Root Cause : Paring mode, discoverable, hard coded Pin.
  • 33. [ 0x02 ] Attack ! Wireless Keyboards If HID server (PC) accepts connections, you might remotely control the PC. (Collin R. Mulliner) If you have the link key : - decryption of packets i.e. capture the keystrokes. - connect to the PC and remotely control it
  • 34. [ 0x02 ] Attack ! The PIN is not really that useful The link key is ! Here’s why : Protocol 1.2 Authentication :
  • 35. [ 0x02 ] Attack ! – 0day InqTana - Setting the Record straight Kevin created a cribbled PoC Worm named InqTana It’s real, it’s here and it’s not an invention of the AV industry, KF handed it over in order for them to protect you against these types of attacks. ObexFTP server directory traversal exploit,malicious InputManager and a local root exploit = remote login tty over rfcomm NO user interaction required Media completely missed the point and invented an obscure conspiracy theory Points were : - Macs are NOT invulnerable (the flaw is patched now) - You can own internal networks over Bluetooth
  • 36. [ 0x02 ] Attack ! – 0day Obex ../../../ - Owning internal networks Apple OSX 10.3 Tiger OSX 10.4 Jaguar Vanilla, delayed release Windows Widcomm, Toshiba, Bluesoil, others ? Pocket PC Kevin: Apple asked me to not tell 10.4 was shipping vulnerable OSX 10.3.9 patched, OSX 10.4 shipped vulnerable patched a month after OSX 10.3.9
  • 37. [ 0x02 ] Attack ! – 0day MAC OS 10.3 & 10.4 Vanilla Multi-Staged attack : Step 1 – ObexFTP ../../../ Attack Step 2 – Using Input Manager launches Root exploit (then binds getty to the pda sync port) Step 3 – Connecting to Port 3 over Rfcomm Step 4 – Harvesting Keys Step 5 – Owning the network, scanning for other BT devices, compromising them.
  • 38. [ 0x02 ] Attack ! – 0day MAC OS 10.3 & 10.4 Vanilla Multi-Staged attack : Spoofing the BD_Address of the Apple and authenticating through stolen link key.
  • 39. [ 0x02 ] Attack ! – 0day Transposed to a Company Server Room Workstations
  • 40. [ 0x02 ] Attack ! – 0day Get the Code For Hack.lu, Inqtana code release : http://www.digitalmunition.com Presented also in the upcoming Hacking Exposed : Wireless
  • 41. [ 0x02 ] Attack ! BUT – The misconception vault we have an USB policy BT is only 10 meters we have automatic patches we have preset policies disabling all Wireless devices Your internal networks are at risk. Implement Mitigation / Monitoring RFProtect and similar Products
  • 42. [ 0x02 ] Attack ! – 0day Introducing BTCrack Hack.lu release Cracks PIN and Linkkey Requires values from a Pairing sniff We can force repairing by using various Methods Based on the research of Shaked and Wool 4 digits pin – 0,25 seconds
  • 43. [ 0x02 ] Attack ! – 0day Introducing BTCrack
  • 44. [ 0x02 ] Attack ! – 0day BT Crack – Behind the scenes (1) Pairing Step1 Generates (RAND) K = E22(RAND, PIN, PIN_LEN) Device A Device B Step1 K = E22(RAND, PIN, PIN_LEN) Rand Step2 Generates (RANDA) CA = RANDA xor K Step2 Generates (RANDB) CB = RANDB xor K CA CB Step3 RANDB=CA xor K LKA=E21(RANDA, ADDRA) LKB=E21(RANDB,ADDRB) LKAB=LKA xor LKB Step3 RANDB=CA xor K LKA=E21(RANDA, ADDRA) LKB=E21(RANDB,ADDRB) LKAB=LKA xor LKB Step4 SRESA = E1(CH_RANDA,ADDRB,LKAB) Step4 SRESB = E1(CH_RANDA,ADDRB,LKAB) CH_RANDA SRESB Step5 SRESA = SRESB E22 = Connection key E21 = Device key
  • 45. [ 0x02 ] Attack ! – 0day BT Crack – Behind the scenes Right : Shaked and Wool logic Bottom: Pseudo code by Tomasz Rybicki Pin =-1; Do { PIN++; CR_K=E22(RAND, PIN, length(PIN)); CR_RANDA = CA xor CR_K; CR_RANDB = CB xor CR_K; CR_LKA = E21 (CR_RANDA, ADDRA); CR_LKB = E21 (CR_RANDB, ADDRB); CR_LKAB = CR_LKA xor CR_LKB; CR_SRES = (CH_RAND, ADDRB, CR_LKAB); } while (CR_SRES == SRES) Hackin9 04/2005 - Tomasz Rybicki
  • 46. [ 0x02 ] Attack ! – 0day BT Crack – Demo
  • 47. [ 0x02 ] Attack ! – 0day BT Crack – Download Give me a bit of time to fix the bugs Will be available at http://www.nruns.com
  • 48. [ 0x02 ] Attack ! Windows Widcomm - Buffer overflows Video http://www.digitalmunition.com/Widcomm.avi File Vulnerable versions Widcomm Stack up to 3.x is vuln Widcomm BTStackServer 1.4.2 .10 Widcomm BTStackServer 1.3.2 .7 Widcomm Bluetooth Communication Software 1.4.1 .03 HP IPAQ 2215 HP IPAQ 5450
  • 49. [ 0x02 ] Attack ! Windows Widcomm - Buffer overflows
  • 50. [ 0x02 ] Attack ! – 0day Owning the Secret Service ? ;) MicroEarpiece – worlds smallest Goes into the ear Tunnel Jabra Headset - Pin Code : 0000 Seriously: You can get it at MicroEarPiece.com Not discoverable, not in Pairing mode, got it yesterday evening, no time
  • 51. [ 0x02 ] Attack ! Things to Remember : Bluetooth might be a risk for your Company Don’t accept every file you are being send, just click NO. Disable Bluetooth if not required Pair in “secure” places (SIG Recommendations) Hold your Bluetooth vendor accountable for vulnerabilities!