Cracking the PIN, Repairing Attack on Bluetooth devices Explained in simplistic manner. suitable for beginners as well as experts in field of Cyber Security and Bluetooth Technology.
We all use Wifi today. You know how much money it saves for your smart-phone data usage band-width. Connecting all your computers and gadgets with cables is not just history, even if you attempt it would be impractical!
Wifi being so pervasive, also brings along tremendous security implications. Come join us to look into details of Wifi security. How to secure your wifi network? How certain wifi encryption technologies can be hacked? We would prove that with live demos!
Join us to reflect on the security aspect of this technology, discuss about it and leave with more confidence about how 'secure' your WiFi access is?
Presented at NZISIG on Tuesday 26th February 2019.
"WPA3: What is it good for? (With a little bit of Bluetooth and a soupçon of GPS)"
I offered this talk to Purplecon but they didn't want it so you're getting it instead. Since it's been a few months I've added some other stuff on the end.
Overview of existing issues in WAP, WPA, WPA2 and WPS
Skateboarding dog story
WPA3 improvements:
- Password protection
- Preshared keys (Simultaneous Authentication of Equals - SAE)
- CNSA
- Opportunistic Wireless Encryption (OWE)
- Wifi Easy Connect
Bluetooth
- Direction finding
- End to end security
GPS
- 6th April could get interesting.
We all use Wifi today. You know how much money it saves for your smart-phone data usage band-width. Connecting all your computers and gadgets with cables is not just history, even if you attempt it would be impractical!
Wifi being so pervasive, also brings along tremendous security implications. Come join us to look into details of Wifi security. How to secure your wifi network? How certain wifi encryption technologies can be hacked? We would prove that with live demos!
Join us to reflect on the security aspect of this technology, discuss about it and leave with more confidence about how 'secure' your WiFi access is?
Presented at NZISIG on Tuesday 26th February 2019.
"WPA3: What is it good for? (With a little bit of Bluetooth and a soupçon of GPS)"
I offered this talk to Purplecon but they didn't want it so you're getting it instead. Since it's been a few months I've added some other stuff on the end.
Overview of existing issues in WAP, WPA, WPA2 and WPS
Skateboarding dog story
WPA3 improvements:
- Password protection
- Preshared keys (Simultaneous Authentication of Equals - SAE)
- CNSA
- Opportunistic Wireless Encryption (OWE)
- Wifi Easy Connect
Bluetooth
- Direction finding
- End to end security
GPS
- 6th April could get interesting.
I will outline the process and steps to create your own layered network architecture and build your own range that can be used for practicing your defensive techniques, offensive skills or even to build your own Capture The Flag (CTF) environment. The process you will learn has been used to create CTFs for DEFCON, Hacker Halted and Showmecon; furthermore, the presentation is an introduction to the process in the instructors book Building Virtual Pentesting Labs for Advanced Penetration Testing
Man in the NFC by Haoqi Shan and Qing YangCODE BLUE
NFC (Near Field Communication) technology is widely used in security, bank, payment and personal information exchange field now, which is highly well-developed. Corresponding, the attacking methods against NFC are also emerged in endlessly. What if we want to “steal” from someone’s EMV. QuickPass, VisaPay bank card without “get” his wallet? To solve this problem, we build a hardware tool which we called “UniProxy”. This tool contains two self-modified high frequency card readers and two radio transmitters, which is a master-salve way. The master part can help people easily and successfully read almost all ISO 14443A type cards no matter what kind of this card is, bank card, ID card, Passport, access card, or whatever, no matter what security protocol this card uses, as long as it meets the ISO 14443A standard, meanwhile replaying this card to corresponding legal card reader via slave part to achieve our “evil” goals. The master and slave communicates with radio transmitters and can be part between 50 – 200 meters.
In 1982, a blind signature, as introduced by David Chaum. Blind Signature Scheme is a form of digital signature scheme which allows a person to get a message signed by another party without revealing any information about the message to the other party.
This presentation introduces the theory behind the blind signature scheme, how to implement it with RSA public cryptographic scheme and various practical aspects of the scheme.
I will outline the process and steps to create your own layered network architecture and build your own range that can be used for practicing your defensive techniques, offensive skills or even to build your own Capture The Flag (CTF) environment. The process you will learn has been used to create CTFs for DEFCON, Hacker Halted and Showmecon; furthermore, the presentation is an introduction to the process in the instructors book Building Virtual Pentesting Labs for Advanced Penetration Testing
Man in the NFC by Haoqi Shan and Qing YangCODE BLUE
NFC (Near Field Communication) technology is widely used in security, bank, payment and personal information exchange field now, which is highly well-developed. Corresponding, the attacking methods against NFC are also emerged in endlessly. What if we want to “steal” from someone’s EMV. QuickPass, VisaPay bank card without “get” his wallet? To solve this problem, we build a hardware tool which we called “UniProxy”. This tool contains two self-modified high frequency card readers and two radio transmitters, which is a master-salve way. The master part can help people easily and successfully read almost all ISO 14443A type cards no matter what kind of this card is, bank card, ID card, Passport, access card, or whatever, no matter what security protocol this card uses, as long as it meets the ISO 14443A standard, meanwhile replaying this card to corresponding legal card reader via slave part to achieve our “evil” goals. The master and slave communicates with radio transmitters and can be part between 50 – 200 meters.
In 1982, a blind signature, as introduced by David Chaum. Blind Signature Scheme is a form of digital signature scheme which allows a person to get a message signed by another party without revealing any information about the message to the other party.
This presentation introduces the theory behind the blind signature scheme, how to implement it with RSA public cryptographic scheme and various practical aspects of the scheme.
Narendra modi’s independence day speech with viewpoint on e commerceeTailing India
On the occasion of our 70th Independence Day, honorable Prime Minister Mr. Narendra Modi gave us a speech with a focus on ‘good governance’. Let’s see the highlight of the speech with respect to its implications on e-commerce industry.
The cloud is driving significant change in how companies deploy and manage resources for their existing business applications. This session explains in non-technical terms how to evaluate if a move to the cloud is in your midst without being a technical expert. We'll explain the many different deployment options as well as business opportunities, pros and cons that companies should consider when addressing the cloud. This session will also provide an executive viewpoint on Azure and it's future potential for businesses.
Why Should You Exhibit at eTailing India Expo M17?eTailing India
Maximize your brand exposure
Get face-to- face with the best and the brightest
Build relationships with existing customer
Meet the most tuned in senior CXOs
Align your brand with top tier thought leadership
Share your expertise and insight
Be a part of something different
Varsha Pawar resides in a village in Maharashtra was like any other housewife until she started selling solar cook stoves and lamps in her neighbourhood a little over a year ago. Today, she is the Sarpanch (village council chief) of Tirth Khurd (her village name) advocating the use of clean energy not only in her village but also in the entire Tuljapur administrative block.
India’s Startups through Thick and Thin in 2016eTailing India
The Indian startup ecosystem system saw a slowdown in funding this year as number of promising startups closed out. After a tough phase of sustainability, startups have taken a hard look at profitable solutions through long-term resilient business strategies. So, let’s check out how the startups have fared in 2016.
Information and data security pseudorandom number generation and stream cipherMazin Alwaaly
Information And Data Security Pseudorandom Number Generation and Stream Cipher seminar
Mustansiriya University
Department of Education
Computer Science
Presentation given at WiSec 2017 by Dr. Virendra Kumar. His, along with Drs. Jonathan Petit and William Whyte's, paper was one of six to receive the reproducibility label.
Crypto 101: Encryption, Codebreaking, SSL and BitcoinPriyanka Aash
Cryptography is the underpinning of digital security. Get introduced to the building blocks of crypto, how they’re applied to secure web connections and bitcoin, and how cryptosystems are attacked in the wild.
(Source: RSA USA 2016-San Francisco)
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...Positive Hack Days
Ведущий: Асука Накадзима (Asuka Nakajima)
Практика повторного использования исходного кода позволяет сократить расходы на разработку программного обеспечения. Тем не менее, если в оригинальном исходном коде кроется уязвимость, она будет перенесена и в новое приложение. Докладчик расскажет о необычном способе обнаружения «наследуемых» уязвимостей в бинарных файлах без необходимости обращаться к исходному коду или символьным файлам.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Bluetooth Hacking: Cracking the PIN and Repairing Attack
1. By Rajeev ChauhanBy Rajeev Chauhan
http://www.cysectips.blogspot.inhttp://www.cysectips.blogspot.in
https://www.facebook.com/cyberoxenhttps://www.facebook.com/cyberoxen
http://cyberoxen.comhttp://cyberoxen.com
Bluetooth SecurityBluetooth Security
Step by Step AnalysisStep by Step Analysis
cyberoxen
2. Bluetooth SecurityBluetooth Security
●
Depends on pair codes to establishDepends on pair codes to establish
the BT Communicationthe BT Communication..
●
Pin cracked.......aim achieved.Pin cracked.......aim achieved.
●
SourceSource Cracking the Bluetooth PinCracking the Bluetooth Pin byby
Yaniv ShakedYaniv Shaked andand Avishai Wool.Avishai Wool.cyberoxen
3. Bluetooth ConnectivityBluetooth Connectivity
●
Basic TriviaBasic Trivia::
–
PIN: Personal Identification NumberPIN: Personal Identification Number..
●
The PIN code is 1-8 bytes long (8-128 bits).The PIN code is 1-8 bytes long (8-128 bits).
●
Most devices use PIN sizes of 4 decimal digits.Most devices use PIN sizes of 4 decimal digits.
–
BD_ADDRBD_ADDR :Each Bluetooth device has a 48 bit:Each Bluetooth device has a 48 bit
unique address that is called the Bluetooth Deviceunique address that is called the Bluetooth Device
Address.Address.
–
Pairing :Pairing :The process in which two (or more) BluetoothThe process in which two (or more) Bluetooth
devices hook up to create a shared secret valuedevices hook up to create a shared secret value
called K_init. The K_init forms the basis for all futurecalled K_init. The K_init forms the basis for all future
Bluetooth negotiations between these two devicesBluetooth negotiations between these two devices.
cyberoxen
5. Bluetooth Pairing andBluetooth Pairing and
AuthenticationAuthentication
●
It involvesIt involves
–
Creation of Intialisation key (KCreation of Intialisation key (K_init_init).).
–
Creation of Link Key (KCreation of Link Key (K_ab_ab).).
–
Authentication.Authentication.
–
Derive Encryption Key forDerive Encryption Key for
communication.communication.
cyberoxen
6. Creation of K_Creation of K_initinit
The K_init key is createdThe K_init key is created
using the E22 algorithm,using the E22 algorithm,
whose inputs are:whose inputs are:
●
BD_ADDR.BD_ADDR.
●
The PIN code and itsThe PIN code and its
length.length.
●
a 128 bit randoma 128 bit random
number IN_RAND.number IN_RAND.
(transmitted in plain txt)(transmitted in plain txt)
●
This algorithm outputs aThis algorithm outputs a
128 bit word, which is128 bit word, which is
referred to as thereferred to as the
initialization key (Kinit).initialization key (Kinit).
Fig ref: http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/
cyberoxen
7. Creation of KCreation of K__abab
●
Using the E21 algorithm, bothUsing the E21 algorithm, both
devices create the link key Kdevices create the link key K_ab_ab..
The inputs of E21 algorithm are:The inputs of E21 algorithm are:
1.1. An BD_ADDRAn BD_ADDR..
2.2. The 128 bit random numberThe 128 bit random number
LK_RAND.LK_RAND.
●
The devices use the initializationThe devices use the initialization
key to exchange two new 128 bitkey to exchange two new 128 bit
random words, known asrandom words, known as
LK_RANDLK_RANDAA and LK_RANDand LK_RANDB.B.
●
Each device selects a randomEach device selects a random
128 bit word and sends it to the128 bit word and sends it to the
other device after bitwise x-oringother device after bitwise x-oring
it with Kit with K_init._init.
Fig ref: http://www.eng.tau.ac.il/~yash/shaked-wool-
mobisys05/
cyberoxen
8. Mutual AuthenticationMutual Authentication
●
The inputs to E1 are:The inputs to E1 are:
1. The random word AU_RAND1. The random word AU_RANDAA..
2. The link key K2. The link key K_ab_ab..
3. Its own Bluetooth device address3. Its own Bluetooth device address
(BD_ADDR(BD_ADDRBB).).
●
This process is based on a challenge-This process is based on a challenge-
response scheme.response scheme.
●
One of the devices, the verifier, randomizesOne of the devices, the verifier, randomizes
and sends (in plaintext) a 128 bit wordand sends (in plaintext) a 128 bit word
called AU_RANDcalled AU_RANDAA and other one, theand other one, the
claimant, sends AU_RANDclaimant, sends AU_RANDB.B.
●
The claimant, calculates a 32 bit wordThe claimant, calculates a 32 bit word
called SRES using an algorithm E1. Thecalled SRES using an algorithm E1. The
claimant sends the 32 bit SRES word as aclaimant sends the 32 bit SRES word as a
reply to the verifier, who verifies (byreply to the verifier, who verifies (by
performing the same calculations) theperforming the same calculations) the
response word.response word.
●
This process is done at both the ends.This process is done at both the ends.
●
As a side effect of the authenticationAs a side effect of the authentication
process, a 96 bit word called ACO isprocess, a 96 bit word called ACO is
calculated by both peers which is usedcalculated by both peers which is used
during the creation of the encryption key.during the creation of the encryption key. Fig ref: http://www.eng.tau.ac.il/~yash/shaked-wool-
mobisys05/
cyberoxen
9. Bluetooth PIN CrackingBluetooth PIN Cracking
●
Messages sent during the pairing and authentication process!!!!!!!!Messages sent during the pairing and authentication process!!!!!!!!
Fig ref: http://www.eng.tau.ac.il/~yash/shaked-wool-
mobisys05/
cyberoxen
10. Bluetooth PIN CrackingBluetooth PIN Cracking
●
Eavesdropped the completeEavesdropped the complete
process.process.
●
Messages recorded.Messages recorded.
●
Attacker enumerates allAttacker enumerates all
possible values of the PINpossible values of the PIN..
●
The attacker runs E22 with inputsThe attacker runs E22 with inputs
IN_RAND and the BD_ADDR, theIN_RAND and the BD_ADDR, the
guessed PIN, and finds aguessed PIN, and finds a
hypothesis for K_init, to decodehypothesis for K_init, to decode
messages 2 and 3.messages 2 and 3.
●
Messages 2 and 3 contain enoughMessages 2 and 3 contain enough
information to give the attacker aninformation to give the attacker an
hypothesis of K_ab.hypothesis of K_ab.
●
Using K_ab and the transmittedUsing K_ab and the transmitted
AU_RANDA (message 4), theAU_RANDA (message 4), the
attacker calculates SRES andattacker calculates SRES and
compares it to the data ofcompares it to the data of
message 5.message 5.
●
The attacker can use the value ofThe attacker can use the value of
messages 6 and 7 to re-verify themessages 6 and 7 to re-verify the
hypothesis K_ab until the correcthypothesis K_ab until the correct
PIN is found.PIN is found.
Fig ref: http://www.eng.tau.ac.il/~yash/shaked-wool-
mobisys05/
cyberoxen
11. Brute Force AlgorithmBrute Force Algorithm
Fig ref: http://www.eng.tau.ac.il/~yash/shaked-wool-
mobisys05/
cyberoxen
12. Bluetooth PIN CrackingBluetooth PIN Cracking
●
Only fully successful against PINOnly fully successful against PIN
values of under 64 bits.values of under 64 bits.
●
If the PIN is longer, then with highIf the PIN is longer, then with high
probability there will be multipleprobability there will be multiple
PIN candidates, since the twoPIN candidates, since the two
SRES values only provide 64 bitsSRES values only provide 64 bits
of data .of data .
●
A 64 bit PIN is equivalent to a 19A 64 bit PIN is equivalent to a 19
decimal digits PIN.decimal digits PIN.
●
The Bluetooth pairing andThe Bluetooth pairing and
authentication process uses threeauthentication process uses three
algorithms: E22, E21, E1.algorithms: E22, E21, E1.
●
All of these algorithms are basedAll of these algorithms are based
on the SAFER+ cipher.on the SAFER+ cipher.
Fig ref: http://www.eng.tau.ac.il/~yash/shaked-wool-
mobisys05/
cyberoxen
13. The Re-Pairing attackThe Re-Pairing attack
●
AssumptionsAssumptions::
–
Both the devices are already paired once.Both the devices are already paired once.
–
Pairing process completed.Pairing process completed.
–
Link Key K_ab stored in each deviceLink Key K_ab stored in each device..
–
Attacker to record all the messages andAttacker to record all the messages and
crack the PIN using the Basic attackcrack the PIN using the Basic attack.
–
Proceed directly to the AuthenticationProceed directly to the Authentication
phasephase.
–
Force the devices to repeat the pairingForce the devices to repeat the pairing
process.process.
–
Bluetooth specifications allow a BluetoothBluetooth specifications allow a Bluetooth
cyberoxen
14. The Re-Pairing attackThe Re-Pairing attack
●
Three different Approaches.Three different Approaches.
●
First MethodFirst Method::
–
The master device sends the slave anThe master device sends the slave an
AU_RANDAU_RAND message, and expects themessage, and expects the
SRESSRES message in return.message in return.
–
(The slave sends an(The slave sends an “LMP_not_accepted“LMP_not_accepted““
message in return, to let the master knowmessage in return, to let the master know
it has forgotten the link key.)it has forgotten the link key.)
–
The attacker injects aThe attacker injects a LMP_not_acceptedLMP_not_accepted
message toward the master. This willmessage toward the master. This will
make the master re-initiate the paring.make the master re-initiate the paring.
–
Restarting the pairing procedure causesRestarting the pairing procedure causes
the master to discard the link key.the master to discard the link key.
cyberoxen
15. The Re-Pairing attackThe Re-Pairing attack
●
Second Method:Second Method:
–
Before the master deviceBefore the master device
sends the slave ansends the slave an
AU_RANDAU_RAND message,message, thethe
attacker injects aattacker injects a IN_RANDIN_RAND
message toward the slave,message toward the slave,
–
The slave device will beThe slave device will be
convinced the master hasconvinced the master has
lost the link key and pairing islost the link key and pairing is
restarted.restarted.
–
This will cause theThis will cause the
connection establishment toconnection establishment to
restart.restart.
cyberoxen
16. The Re-Pairing attackThe Re-Pairing attack
●
Third MethodThird Method ::
–
After Master has sent theAfter Master has sent the
AU_RAND,AU_RAND, An attackerAn attacker
injects a random SRESinjects a random SRES
message toward the master.message toward the master.
–
This causes theThis causes the
Authentication phase toAuthentication phase to
restart, and repeatedrestart, and repeated
attempts will be made.attempts will be made.
–
At some point, after a certainAt some point, after a certain
number of failednumber of failed
authentication attempts, theauthentication attempts, the
master device is expected tomaster device is expected to
declare that thedeclare that the
authentication procedure hasauthentication procedure has
failed and initiate pairing.failed and initiate pairing.
cyberoxen
17. The Re-Pairing attackThe Re-Pairing attack
●
CulminationCulmination::
–
This assures the pairing process will occur during the nextThis assures the pairing process will occur during the next
connection establishment, so the attacker will be able toconnection establishment, so the attacker will be able to
eavesdrop on the entire process, and use the basic methodeavesdrop on the entire process, and use the basic method
to crack the PIN.to crack the PIN.
–
After breaking the PIN (0.06-0.3 sec for a 4 digit PIN), theAfter breaking the PIN (0.06-0.3 sec for a 4 digit PIN), the
attacker can decode the saved messages, and continue toattacker can decode the saved messages, and continue to
eavesdrop and decode the communication on the fly.eavesdrop and decode the communication on the fly.
–
Since Bluetooth supports a bit rate of 1 Megabit per second,Since Bluetooth supports a bit rate of 1 Megabit per second,
a 40KB buffer is more than enough for the common case ofa 40KB buffer is more than enough for the common case of
a 4 digit PIN.a 4 digit PIN.
cyberoxen
18. CountermeasuresCountermeasures
●
Refrain from entering the PIN into the Bluetooth device forRefrain from entering the PIN into the Bluetooth device for
pairing as much as possible.pairing as much as possible.
●
Use PIN longer than 6 digits.Use PIN longer than 6 digits.
●
The PIN length ranges from 8 to 128 bits. Should ask forThe PIN length ranges from 8 to 128 bits. Should ask for
longer bit lenghts.longer bit lenghts.
●
Set Bluetooth device in “non-discoverable mode/hiddenSet Bluetooth device in “non-discoverable mode/hidden
mode”.mode”.
●
Application level security in addition to BT authentication....Application level security in addition to BT authentication....
ie password.ie password.
cyberoxen
19. CountermeasuresCountermeasures
●
Use the strongest Bluetooth securityUse the strongest Bluetooth security
mode available on the device.mode available on the device.
●
Avoid use of standard commercialAvoid use of standard commercial
Bluetooth headsets.Bluetooth headsets.
●
Disable Bluetooth functionality whenDisable Bluetooth functionality when
not in use. Use shorter range Class 2not in use. Use shorter range Class 2
or 3 devices.or 3 devices.
●
Make devices discoverable onlyMake devices discoverable only
when necessary.when necessary.
●
Pair Bluetooth devices in a securePair Bluetooth devices in a secure
area using long and randomlyarea using long and randomly
cyberoxen