SlideShare a Scribd company logo
Bluetooth Security
          Mechanisms
                       Hochschule der Medien
                             Computer Science and Media

                                Mobile Security
                               Marvin Hoffmann (B.Sc.)



contact@marvin-hoffmann.de                                18. April 2011
Fun-Facts
1. Bluetooth is anglicised for „Blåtand“
  - danish king who was well known for his
     communication skills
2. Bluetooth logo is a bind rune merging
   Hagall and Bjarkan runes, the initials of
   „Harald Blauzahn“
Agenda
1. Bluetooth Technology and Standards
2. Security Mechanisms
3. Weaknesses
 • exloitation and protection
4. Known Attacks
5. Conclusion
1. Bluetooth Technology
•   developed by Ericsson in 1994

•   since 1998 managed by „Bluetooth Special Interest
    Group“ (over 14.000 companies)

•   v1.0a July 1999 // v1.1 in early 2001

•   current Version 4.0 (since December 2009)

•   fully backward compatible to v1.1




                           4
1. Bluetooth Technology
•   uses 2.5 GHz ISM band (Industrial, Scientific,
    Medical) - licence-free worldwide

•   frequence spectrum 2402-2480 MHz
    -   divided into 79 channels, 1 MHz each

•   channel changes 1600 times per second
    -   leads to 625 µs timeslots

    -   determine hopping sequence on connection



                                5
1. Bluetooth Technology
•   Two types of networks

    •   Piconet
                                                     M            S

        -   1 master, up to 255 slaves
            (max. 8 active devices at a time, incl. master) S

    •   Scatternet
        -   consists of two or more Piconets              M               S
                                                                                  P

                                                                      S

                                                                                      P
                                                                              S
                                                              M

                                   6
1. Bluetooth Technology
•   3 classes with different permitted power and range

•   minimum distance 10cm


                            permitted power                  range *
                                (mW)                           (m)
         not
    recommended
                  Class 1            100                      100

    recommended   Class 2            2.5                       10

    recommended   Class 3              1                       1
                            * ranges under best conditions


                            7
1. Bluetooth Technology
   •   evolution of data rates and features


                  v1.1              v1.2                v2.0            v3.0              v4.0
                 (02.2001)         (11.2003)            (11.2004)       (04.2009)         (12.2009)


                                                                       up to 24        still 2,1 / 24
 data-rate     732,2 KBit/s        1 MBit/s           2,1 MBit/s        MBit/s             MBit/s
                                                                      (peer-to-peer)


                                    Adaptive
               Received Signal                                        high speed
                                   Frequency-         Enhanced Data                     Bluetooth low
new features      Strength
                                 Hopping spread        Rate (EDR)
                                                                      channel on
                                                                                       energy protocol
                 Indication                                           WLAN basis
                                 spectrum (AFH)



                                                  8
1. Bluetooth Technology
•   the 4 different states when setting up a connection


      Inquiry                            Page




      Standby                         Connected


                          9
1. Bluetooth Technology
•   Inquiry
    -   master sending on different frequences (changing all 3.12µs)

    -   slave scanning on different frequences (changing all 1.28µs)

    -   synchronisation of channelhops

    -   switching to „Page“-mode


•   Page                                       Inquiry                   Page


    -   calculating hopping-sequence
        including unique hardware-ID
        of the master device
                                               Standby                 Connected
    -   switching to „Connected“-mode

                                       10
1. Bluetooth Technology
•   Connected
    -   synchronous frequency-hopping

    -   using pattern settled in page mode

•   Standby
    -   no communication
                                      Inquiry     Page

    -   energy saving


                                     Standby    Connected



                               11
1. Bluetooth Technology
•   pairing process
                          random number
       M                                          S

                          acknowledgement
       M                                          S
                      random number + PIN +
       M              masters Bluetooth address   S
                              (simplified)

                         XOR combination
       M                  and verification         S

                               :) / :(
       M                     session key          S
                                  12
2. Security Mechanisms
•   frequence hopping
    -   master and slaves within a Piconet know
        the hopping-sequence

    -   attacker does not

•   limited range
    -   class 2 or class 3 should be used (class 2 most common)

    -   turn off when in public or connection not required




                               13
2. Security Mechanisms
•   optional pre-shared key authentication and
    encryption algorithms

•   strength of security relies primarily on length and
    randomness of the passkey used for pairing

•   discoverability and connectability
    -   control whether remote Bluetooth devices are able to
        find and connect to a local Bluetooth device

•   optional user authorization for incoming


                               14
3. Weaknesses
•   hidden phones can be scanned

•   PIN authentication is weak (BF attack possible when
    PIN too simple)
    -   save pin -> no PIN authentication required again

    -   PIN should be more then 8 characters
        (16 characters possible / 128bit)

    -   be careful when reauthentication requested

•   fix and often weak PINs in devices without keyboard

                                15
3. Weaknesses

„According to the Bluetooth specification, PINs can be
8-128 bits long. Unfortunately, most manufacturers have
standardized on a four decimal-digit PIN. This attack can
crack that 4-digit PIN in less than 0.3 sec on an old
Pentium III 450MHz computer, and in 0.06 sec on a
Pentium IV 3Ghz HT computer.“
Bruce Schneier (June 2005)




                             16
3. Weaknesses
•   unit keys: one shared key with all trusted units
    -   trusted units can impersonate the unit distributing the key

    -   no protection against trusted units



•   not all attacks need to know frequence-sequence

•   scanner that listens on all 79 channels can spy
    hopping-sequence



                                17
3. Weaknesses
•   3 security modes
    -   mode 1: no encryption : (

    -   mode 2: activated by application - therefore possibly off : (

    -   mode 3: always on : )




                                 18
4. Known Attacks
•   BlueJacking
    -   sending vCard contact, containing a message as name

•   BlueSnarfing
    -   allows access to calendar, contact list, emails and text-
        messages

    -   patched in newer Bluetooth standards

•   BlueBug
    -   calls, SMS, phonebook, forward calls, www, use provider, ...


                                 19
4. Known Attacks
•   CommWarrior
    -   presented by Jörg last week

•   Location Tracking
    -   can be used for advertising combined with Bluejacking

•   DOS attack
    -   e.g. stop device to switch in energy-saving standby mode




                                20
5. Conclusion
•   most dangerous in crowded, public places due to
    limited range of class 2 devices

•   hiding the phone does not protect completely, but
    increases effort dramatically

•   relatively secure technology
    -   depends highly on implementation of manufacturer
        (chosen class, security mode, build in PIN, etc.)




                               21
5. Recommendations
•   pairing process at secure place

•   choose strong PIN

•   turn off completely when not in use

•   at least hide your phone




                          22
Questions?
Discussion!
Sources
•   Hochschule der Medien Stuttgart
    Mathias Leidecker und Alexander Ultsch: Bluetooth Sicherheitsanalyse

•   HU Berlin - Dipl.-Inf. J. Richling: Drahtlose Kommunikation (Teil 2)
    http://www2.informatik.hu-berlin.de/~richling/emes2003/10-wireless.pdf


•   Systems and Network Analysis Center / Information Assurance Directorate:
    Bluetooth Security

•   Offical Bluetooth Technology Web Site
    http://www.bluetooth.com/


•   Wikipedia
    http://de.wikipedia.org/wiki/Bluetooth
    http://en.wikipedia.org/wiki/Bluetooth

•   Bruce Schneier: Schneier.com
    http://www.schneier.com/blog/archives/2005/06/attack_on_the_b_1.html
Sources
•   Internet-Sicherheit.de
    http://www.internet-sicherheit.de/service/glossar/eintrag/eintrag-detail/bluetooth-pairing/


•   Shmoo.com: Bluesniff - The next wardriving frontier
    http://bluesniff.shmoo.com/
    http://www.shmoo.com/~gdead/dc-11-brucepotter.ppt


•   PC Games Hardware (Bluetooth Logo)
    http://www.pcgameshardware.de/screenshots/original/2009/04/Bluetooth_LOGO.gif

More Related Content

What's hot

5 g Technology
5 g  Technology5 g  Technology
5 g Technology
Shivam Kashyap
 
Bluetooth
BluetoothBluetooth
Bluetooth
Hina Saxena
 
Bluetooth
BluetoothBluetooth
Bluetooth
Raju Kunde
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
sateesh vysyaraju
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
Ayesha Saeed
 
Bluetooth
BluetoothBluetooth
Bluetooth
Rajan Kumar
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
guest664c3f
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2
Vijay Kribpz
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
Siva Pradeep Bolisetti
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
NEEVEE Technologies
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
dima gurov
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
priyadharshini murugan
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
politegcuf
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
HasanMaster
 
Bluetooth
BluetoothBluetooth
Bluetooth
Samraiz Tejani
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
Hina Saxena
 
Bluetooth
BluetoothBluetooth
Bluetooth
Ujju146
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
Himangshu Hazra
 
BLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGYBLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGY
Jigyanshu Jangid
 
Passive Optical Networks - PON: Customer Case Study, Design, Implementation a...
Passive Optical Networks - PON: Customer Case Study, Design, Implementation a...Passive Optical Networks - PON: Customer Case Study, Design, Implementation a...
Passive Optical Networks - PON: Customer Case Study, Design, Implementation a...
Bruno Teixeira
 

What's hot (20)

5 g Technology
5 g  Technology5 g  Technology
5 g Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
BLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGYBLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGY
 
Passive Optical Networks - PON: Customer Case Study, Design, Implementation a...
Passive Optical Networks - PON: Customer Case Study, Design, Implementation a...Passive Optical Networks - PON: Customer Case Study, Design, Implementation a...
Passive Optical Networks - PON: Customer Case Study, Design, Implementation a...
 

Viewers also liked

Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
Manish Sharma
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
AJAL A J
 
Bluetooth PPT Report
Bluetooth PPT ReportBluetooth PPT Report
Bluetooth PPT Report
Bilal Maqbool ツ
 
Carwhisperer Bluetooth Attack
Carwhisperer Bluetooth AttackCarwhisperer Bluetooth Attack
Carwhisperer Bluetooth Attack
n|u - The Open Security Community
 
Hacking the Internet of Things
Hacking the Internet of ThingsHacking the Internet of Things
Hacking the Internet of Things
Mike Hagedorn
 
Makler-Umfrage zum Bestellerprinzip und der Mietpreisbremse
Makler-Umfrage zum Bestellerprinzip und der MietpreisbremseMakler-Umfrage zum Bestellerprinzip und der Mietpreisbremse
Makler-Umfrage zum Bestellerprinzip und der Mietpreisbremse
ImmobilienScout24
 
HDR_Hydroqual_selenium_brochure
HDR_Hydroqual_selenium_brochureHDR_Hydroqual_selenium_brochure
HDR_Hydroqual_selenium_brochure
John Sondey
 
Ley 2320 creación Fernández Alonso
Ley 2320 creación Fernández AlonsoLey 2320 creación Fernández Alonso
Ley 2320 creación Fernández Alonso
Doctora Edilicia
 
Revista Cores Reportagens
Revista Cores   ReportagensRevista Cores   Reportagens
Revista Cores Reportagens
Mayara Carol Araujo
 
Minsa.tbc 2010
Minsa.tbc 2010Minsa.tbc 2010
Bases becas carnet de camion la pobla de vallbona
Bases becas carnet de camion la pobla de vallbonaBases becas carnet de camion la pobla de vallbona
Bases becas carnet de camion la pobla de vallbona
Ajuntament La Pobla de Vallbona
 
Estrategias de mercadeo uc 6
Estrategias de mercadeo uc 6Estrategias de mercadeo uc 6
Estrategias de mercadeo uc 6
Ricardo Herrera
 
Top SEO Tools
Top SEO ToolsTop SEO Tools
Top SEO Tools
AIRR Media
 
Termes La Garriga
Termes La Garriga Termes La Garriga
Termes La Garriga
Laura
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
VictorYee
 
Survey of Rater Training Programs
Survey of Rater Training ProgramsSurvey of Rater Training Programs
Survey of Rater Training Programs
C. Allen Gorman
 
¿ Triibuto a la belleza de carabajo -¿
 ¿ Triibuto a la belleza de carabajo -¿ ¿ Triibuto a la belleza de carabajo -¿
¿ Triibuto a la belleza de carabajo -¿
tomasvila
 
Directores 2
Directores 2Directores 2
Directores 2
SaludBasadaEmociones
 
Manual de Comunicaciones
Manual de ComunicacionesManual de Comunicaciones
Manual de Comunicaciones
Lu Esqueche
 
Revista Culturism nr. 116 (2/2001)
Revista Culturism nr. 116 (2/2001)Revista Culturism nr. 116 (2/2001)
Revista Culturism nr. 116 (2/2001)Redis Nutritie
 

Viewers also liked (20)

Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Bluetooth PPT Report
Bluetooth PPT ReportBluetooth PPT Report
Bluetooth PPT Report
 
Carwhisperer Bluetooth Attack
Carwhisperer Bluetooth AttackCarwhisperer Bluetooth Attack
Carwhisperer Bluetooth Attack
 
Hacking the Internet of Things
Hacking the Internet of ThingsHacking the Internet of Things
Hacking the Internet of Things
 
Makler-Umfrage zum Bestellerprinzip und der Mietpreisbremse
Makler-Umfrage zum Bestellerprinzip und der MietpreisbremseMakler-Umfrage zum Bestellerprinzip und der Mietpreisbremse
Makler-Umfrage zum Bestellerprinzip und der Mietpreisbremse
 
HDR_Hydroqual_selenium_brochure
HDR_Hydroqual_selenium_brochureHDR_Hydroqual_selenium_brochure
HDR_Hydroqual_selenium_brochure
 
Ley 2320 creación Fernández Alonso
Ley 2320 creación Fernández AlonsoLey 2320 creación Fernández Alonso
Ley 2320 creación Fernández Alonso
 
Revista Cores Reportagens
Revista Cores   ReportagensRevista Cores   Reportagens
Revista Cores Reportagens
 
Minsa.tbc 2010
Minsa.tbc 2010Minsa.tbc 2010
Minsa.tbc 2010
 
Bases becas carnet de camion la pobla de vallbona
Bases becas carnet de camion la pobla de vallbonaBases becas carnet de camion la pobla de vallbona
Bases becas carnet de camion la pobla de vallbona
 
Estrategias de mercadeo uc 6
Estrategias de mercadeo uc 6Estrategias de mercadeo uc 6
Estrategias de mercadeo uc 6
 
Top SEO Tools
Top SEO ToolsTop SEO Tools
Top SEO Tools
 
Termes La Garriga
Termes La Garriga Termes La Garriga
Termes La Garriga
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
 
Survey of Rater Training Programs
Survey of Rater Training ProgramsSurvey of Rater Training Programs
Survey of Rater Training Programs
 
¿ Triibuto a la belleza de carabajo -¿
 ¿ Triibuto a la belleza de carabajo -¿ ¿ Triibuto a la belleza de carabajo -¿
¿ Triibuto a la belleza de carabajo -¿
 
Directores 2
Directores 2Directores 2
Directores 2
 
Manual de Comunicaciones
Manual de ComunicacionesManual de Comunicaciones
Manual de Comunicaciones
 
Revista Culturism nr. 116 (2/2001)
Revista Culturism nr. 116 (2/2001)Revista Culturism nr. 116 (2/2001)
Revista Culturism nr. 116 (2/2001)
 

Similar to Bluetooth Security

Blue tooth
Blue toothBlue tooth
Blue tooth
swapnareddy20
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
ssuser1d7ef1
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
georgejustymirobi1
 
Bluetooth
BluetoothBluetooth
Bluetooth
Kashyap Shah
 
Bluetooth
BluetoothBluetooth
Bluetooth
Fahim Faysal
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
Saurav Kumar
 
7952034.ppt
7952034.ppt7952034.ppt
7952034.ppt
AnubhavDas32
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
deepak kumar
 
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
KevinYangYang
 
Data Communication and Network World of Bluetooth
Data Communication and Network World of BluetoothData Communication and Network World of Bluetooth
Data Communication and Network World of Bluetooth
Chandrakant Divate
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
punjab engineering college, chandigarh
 
Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
Muhammed Afsal Villan
 
Bluetooth
BluetoothBluetooth
Bluetooth
Mac_Kevin
 
Bluetooth
BluetoothBluetooth
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
Engr Sid
 
Short blutooth present
Short blutooth present Short blutooth present
Short blutooth present
syedishaq
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
ssuser1d7ef1
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
georgejustymirobi1
 
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptxAWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
shashijntuhceh
 
Bluetooth
BluetoothBluetooth

Similar to Bluetooth Security (20)

Blue tooth
Blue toothBlue tooth
Blue tooth
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
7952034.ppt
7952034.ppt7952034.ppt
7952034.ppt
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
 
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
 
Data Communication and Network World of Bluetooth
Data Communication and Network World of BluetoothData Communication and Network World of Bluetooth
Data Communication and Network World of Bluetooth
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Short blutooth present
Short blutooth present Short blutooth present
Short blutooth present
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptxAWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

Bluetooth Security

  • 1. Bluetooth Security Mechanisms Hochschule der Medien Computer Science and Media Mobile Security Marvin Hoffmann (B.Sc.) contact@marvin-hoffmann.de 18. April 2011
  • 2. Fun-Facts 1. Bluetooth is anglicised for „Blåtand“ - danish king who was well known for his communication skills 2. Bluetooth logo is a bind rune merging Hagall and Bjarkan runes, the initials of „Harald Blauzahn“
  • 3. Agenda 1. Bluetooth Technology and Standards 2. Security Mechanisms 3. Weaknesses • exloitation and protection 4. Known Attacks 5. Conclusion
  • 4. 1. Bluetooth Technology • developed by Ericsson in 1994 • since 1998 managed by „Bluetooth Special Interest Group“ (over 14.000 companies) • v1.0a July 1999 // v1.1 in early 2001 • current Version 4.0 (since December 2009) • fully backward compatible to v1.1 4
  • 5. 1. Bluetooth Technology • uses 2.5 GHz ISM band (Industrial, Scientific, Medical) - licence-free worldwide • frequence spectrum 2402-2480 MHz - divided into 79 channels, 1 MHz each • channel changes 1600 times per second - leads to 625 µs timeslots - determine hopping sequence on connection 5
  • 6. 1. Bluetooth Technology • Two types of networks • Piconet M S - 1 master, up to 255 slaves (max. 8 active devices at a time, incl. master) S • Scatternet - consists of two or more Piconets M S P S P S M 6
  • 7. 1. Bluetooth Technology • 3 classes with different permitted power and range • minimum distance 10cm permitted power range * (mW) (m) not recommended Class 1 100 100 recommended Class 2 2.5 10 recommended Class 3 1 1 * ranges under best conditions 7
  • 8. 1. Bluetooth Technology • evolution of data rates and features v1.1 v1.2 v2.0 v3.0 v4.0 (02.2001) (11.2003) (11.2004) (04.2009) (12.2009) up to 24 still 2,1 / 24 data-rate 732,2 KBit/s 1 MBit/s 2,1 MBit/s MBit/s MBit/s (peer-to-peer) Adaptive Received Signal high speed Frequency- Enhanced Data Bluetooth low new features Strength Hopping spread Rate (EDR) channel on energy protocol Indication WLAN basis spectrum (AFH) 8
  • 9. 1. Bluetooth Technology • the 4 different states when setting up a connection Inquiry Page Standby Connected 9
  • 10. 1. Bluetooth Technology • Inquiry - master sending on different frequences (changing all 3.12µs) - slave scanning on different frequences (changing all 1.28µs) - synchronisation of channelhops - switching to „Page“-mode • Page Inquiry Page - calculating hopping-sequence including unique hardware-ID of the master device Standby Connected - switching to „Connected“-mode 10
  • 11. 1. Bluetooth Technology • Connected - synchronous frequency-hopping - using pattern settled in page mode • Standby - no communication Inquiry Page - energy saving Standby Connected 11
  • 12. 1. Bluetooth Technology • pairing process random number M S acknowledgement M S random number + PIN + M masters Bluetooth address S (simplified) XOR combination M and verification S :) / :( M session key S 12
  • 13. 2. Security Mechanisms • frequence hopping - master and slaves within a Piconet know the hopping-sequence - attacker does not • limited range - class 2 or class 3 should be used (class 2 most common) - turn off when in public or connection not required 13
  • 14. 2. Security Mechanisms • optional pre-shared key authentication and encryption algorithms • strength of security relies primarily on length and randomness of the passkey used for pairing • discoverability and connectability - control whether remote Bluetooth devices are able to find and connect to a local Bluetooth device • optional user authorization for incoming 14
  • 15. 3. Weaknesses • hidden phones can be scanned • PIN authentication is weak (BF attack possible when PIN too simple) - save pin -> no PIN authentication required again - PIN should be more then 8 characters (16 characters possible / 128bit) - be careful when reauthentication requested • fix and often weak PINs in devices without keyboard 15
  • 16. 3. Weaknesses „According to the Bluetooth specification, PINs can be 8-128 bits long. Unfortunately, most manufacturers have standardized on a four decimal-digit PIN. This attack can crack that 4-digit PIN in less than 0.3 sec on an old Pentium III 450MHz computer, and in 0.06 sec on a Pentium IV 3Ghz HT computer.“ Bruce Schneier (June 2005) 16
  • 17. 3. Weaknesses • unit keys: one shared key with all trusted units - trusted units can impersonate the unit distributing the key - no protection against trusted units • not all attacks need to know frequence-sequence • scanner that listens on all 79 channels can spy hopping-sequence 17
  • 18. 3. Weaknesses • 3 security modes - mode 1: no encryption : ( - mode 2: activated by application - therefore possibly off : ( - mode 3: always on : ) 18
  • 19. 4. Known Attacks • BlueJacking - sending vCard contact, containing a message as name • BlueSnarfing - allows access to calendar, contact list, emails and text- messages - patched in newer Bluetooth standards • BlueBug - calls, SMS, phonebook, forward calls, www, use provider, ... 19
  • 20. 4. Known Attacks • CommWarrior - presented by Jörg last week • Location Tracking - can be used for advertising combined with Bluejacking • DOS attack - e.g. stop device to switch in energy-saving standby mode 20
  • 21. 5. Conclusion • most dangerous in crowded, public places due to limited range of class 2 devices • hiding the phone does not protect completely, but increases effort dramatically • relatively secure technology - depends highly on implementation of manufacturer (chosen class, security mode, build in PIN, etc.) 21
  • 22. 5. Recommendations • pairing process at secure place • choose strong PIN • turn off completely when not in use • at least hide your phone 22
  • 24. Sources • Hochschule der Medien Stuttgart Mathias Leidecker und Alexander Ultsch: Bluetooth Sicherheitsanalyse • HU Berlin - Dipl.-Inf. J. Richling: Drahtlose Kommunikation (Teil 2) http://www2.informatik.hu-berlin.de/~richling/emes2003/10-wireless.pdf • Systems and Network Analysis Center / Information Assurance Directorate: Bluetooth Security • Offical Bluetooth Technology Web Site http://www.bluetooth.com/ • Wikipedia http://de.wikipedia.org/wiki/Bluetooth http://en.wikipedia.org/wiki/Bluetooth • Bruce Schneier: Schneier.com http://www.schneier.com/blog/archives/2005/06/attack_on_the_b_1.html
  • 25. Sources • Internet-Sicherheit.de http://www.internet-sicherheit.de/service/glossar/eintrag/eintrag-detail/bluetooth-pairing/ • Shmoo.com: Bluesniff - The next wardriving frontier http://bluesniff.shmoo.com/ http://www.shmoo.com/~gdead/dc-11-brucepotter.ppt • PC Games Hardware (Bluetooth Logo) http://www.pcgameshardware.de/screenshots/original/2009/04/Bluetooth_LOGO.gif

Editor's Notes

  1. 3 Runde Sicherheit Mobiler Systeme\ndie meisten aus MI Bachelor / erstes Semester CSM\nfolgefragen gerne per mail\nbevor wir starten; namensgebung .. zähne, blau\n
  2. herrschte im 10. JH und hat Dänemark weitgehend christianisiert\nwar bekannt für seine Kommunikationsfähigkeit\nauch Logo Hommage an ihn\nEricsson und Nokia\n
  3. Thema ist in Rahmenprogramm eingebettet\n1. Keine Grundlagen im Bachelor / RN2 / Merle / wichtig für Vortrag\n2. Mechanismen zum Schutz\n3. Aufspüren und Ausnutzung von Schwachstellen / Schutz\n4. Jörg\n5. Zusammenfassung und Blick in die Zukunft\n
  4. Entwicklung als Alternative zu Kabel und IR (Sichtkontakt)\nSpecial Interest Group veröffentlicht die Standards (3Com, Ericsson, IBM, Intel, Microsoft, Motorola, Nokia und Toshiba)\nv1.0 a und b sehr buggy / marktgerecht v1.1\nalle versionen rückwärtskompatibel zu 1.1\nfeatures wie enhanced data rate 2.0 // Highspeed kanal (wlan p2p) // low energy (kurze übertragungs aufbauzeit) 4.0\n
  5. außerdem im Spektrum: WLAN, Schnurlostelefone, Mikrowellenherd\nguardband zu anderen frequenzbereichen\nfrequence hopping als sicherheitsmechanismus\n
  6. Time-Multiplexing\nGerät kann nur Master in einem Piconet sein\nGeräte können mehreren Scatternets angehören\nDatenrate leidet erheblich in Scatternets\nPiconets werden durch unterschiedliche Frequency-Hopping Folgen identifiziert\n
  7. Je kleiner die Reichweite, desto kleiner die Wahrs. Opfer eines Angriffes zu werden\nPAN\nsendeleistung class 2 und 3 gesünder :)\nclass 2 am häufigsten genutzt.. zB auch bei handys\nBluetooth low energy reduziert verbrauch auf 1/2 bis zu 1/100\n
  8. v1.1 wie gesagt erste marktfähige version\nv1.2 afh:\nv2 schnellere übertragung\nv3 high speed kanal zusätzlich. basis rate immer noch bei 2,1mbit/s\nv4 low energy senkt energieverbrauch auf 1/2 bis 1/100\n
  9. 4 Modi in denen sich ein gerät befinden kann\ninquiry mode = such modus\npage mode = verbindungaufbau\n
  10. – Master sendet auf einer definierten Frequenz-Sequenz Signale im 3.12μs Muster\n– Wartet auf Rückmeldung\n– Slave scannt gleiche Frequenzfolge im 1.28μs Muster\n– Durch unterschiedliche Hoppingfrequenzen findet Treffen mit hoher Wahrscheinlichkeit in kurzer Zeit statt\n– Slave sendet Informationen über seine Systemtaktung\n– Synchronisation des Channelhops\n– Wechsel nach Page-Mode\n
  11. \n
  12. \n
  13. \n
  14. \n
  15. 1. bruteforce ganzer adressbereich / erste drei bytes hersteller code / trotzdem zu lange\n2. ebenfalls bruteforce möglich bei schwachem pin\n3. headsets oder ähnliche geräte ohne tastatur haben festen, sehr oft sehr schwachen pin\n
  16. 1. bruteforce ganzer adressbereich / erste drei bytes hersteller code / trotzdem zu lange\n2. ebenfalls bruteforce möglich bei schwachem pin\n3. headsets oder ähnliche geräte ohne tastatur haben festen, sehr oft sehr schwachen pin\n
  17. unit keys: alle angemeldeten geräte teilen sich einen key\nsomit können authorisierte geräte nun das andere gerät imitieren, da sie den unit key kennen und dessen adresse\ngeräte müssen aber einmal authorisiert sein\n
  18. \n
  19. - bluejack harmlos\n- Die Bluesnarfing-Attacke wird eingesetzt um Bluetooth Geräte wie Mobiltelefone auszusionieren. Es lassen sich Daten aus dem Gerät auslesen, ohne dass der Besitzer dies wahrnehmen kann. Das Entscheidende hierbei ist, dass für die Datenübertragung keine Kopplung der Geräte erfolgt.\n- bluebug nicht nur ausspionieren, sondern auch zufügen von (finanziellem) schaden\n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n