SlideShare a Scribd company logo
Bluetooth Vulnerabilities

     ECE 478 Winter 05
        Victor Yee
Topics
•   What is Bluetooth?      •   Eavesdropping
•   History                 •   Impersonation
•   SIG
                            •   Cipher Vulnerabilities
•   Modes
•   Address
                            •   Bluejacking
•   Pairing                 •   Bluesnarfing
                            •   Bluetooone
                            •   Bluesniper
What is Bluetooth?
• Wirelessly connect to
  –   Wireless headsets
  –   Handhelds
  –   Personal computers
  –   Printers
  –   Mobile phones
  –   Digital cameras
  –   GPS receivers
  –   Digital pens
  –   Automobiles
What is Bluetooth?
• Short-range (10m-100m) wireless specification
• Operating at 2.4GHz radio spectrum
• Allows up to 7 simultaneous connections
  maintained by a signal radio.
• Data transfers at least 2Mb/s
History
• Named from Danish King Harold Bluetooth from
  the 10th century
  – instrumental in uniting warring factions that is now
    Norway, Sweden, and Denmark
• The logo was designed by a Scandinavian firm
  in which the runic character H & B were used
SIG
• Bluetooth Special Interest Group
  – Privately held trade associations made up of leaders
     •   Telecom
     •   Computing
     •   Automotive
     •   Industrial automation
     •   Network industries.
  – They are marketing and advancing the development
    of the technology
Bluetooth Protocol Stack
• L2CAP - Logical Link Control and Adaptation
  Protocol
• OBEX - Generalized Multi-Transport Object
  Exchange Protocol
• RFCOMM - Serial Port Emulation
• SDP - Service Discovery Protocol
• TCS - Telephony Control protocol Specification
Modes
• Bluetooth devices can be in different modes
  – Discoverable
     • Device can be found by others searching in range
  – Connectable
     • Respond to messages from connected devices
  – Non-Discoverable
  – Non-Connectable
Address
• Bluetooth device address (MAC)
  – Unique identifier for the device for all communication
  – Device Access Code (DAC) is used to address the
    device
  – Channel Access Code (CAC) is used to identify the
    channel
  – DAC & CAC
     • Determined by device address
     • Not encrypted
Address
• Unique Address
  – Track and monitor behavior of user
  – Logs = Violation of privacy
Security Modes
• Mode 1
  – No Security
• Mode 2
  – Application/Service
    based (L2CAP)
• Mode 3
  – Link-Layer
     • PIN Authentication
     • Address Security
     • encryption
Security Modes
• Difference between Mode 2 and Mode 3
  – Bluetooth device initiates security procedures before
    the channel is established during Mode 3
Security Modes
• Different security Modes for devices and
  services
  – Devices (2 Levels)
     • Trusted Device – unrestricted access to all services
     • Untrusted Device
  – Services (3 Levels)
     • Require authorization and authentication
     • Require authentication only
     • Open to all devices
How does Pairing Work?
• Two Bluetooth devices need to pair up before
  data can be exchanged.
• PIN consisting of numeric digits from 0-9 is
  established
• Device sends a random number to the other
  device.
• Both devices compute the initiation key based
  on a function of the shared PIN, Bluetooth
  device address that received the random
  number, and the random number.
PIN
• 0000 is default
   – 50% of used PINs are 0000 (Laziness)
• 4 digits
   – 10,000 Possibilities
Verification
• Other device responds the computed
  computation back to the first device
• First device compares the received value to its
  computed value if they are the same
• Then the roles switch
Eavesdropping
• Attacker is able to listen to messages or data
  exchanged between devices.
  – No application layer encryption
  – Middle-person attack
• Voice data between phone and headset
• Obtain credit card information (Internet
  purchases)
• Exhaustively guesses all PIN up to a certain
  length
Impersonation
• If PIN is known, Attacker is able to impersonate
  – Alter email responses (Internet Access)
  – Data to be printed (Printer)
Cipher Vulnerabilities
• 128 bit key can be broken in 2^64
• Divide-and-conquer attacks are not
  possible
  – Need access to key stream over long periods
  – Bluetooth has high resynchronization
    frequencies
Bluejacking
• Sending anonymous messages to another
  device without approval or authorization
• Example
  – Tourists admirers Swedish handicrafts in a storefront
    window, cell phone chirped with an anonymous note:
    quot;Try the blue sweaters. They keep you warm in the
    winter.quot;

    Tourist is oblivious to who the sender is.
Bluesnarfing
• Snarf is network slang for unauthorized copy
• Theft of Data, Calendar Information, Phonebook
  Contacts, Phone’s IMEI
  – Stolen IMEI can be used for cloning a phone
• Attacker establishes connection without
  confirmation
• Cell phones vulnerable to privacy invasion
• Devices can be purchased on the Internet
• Attackers exploit a flaw through OBEX Protocol
  using a PUSH Channel attack
BlueBug
• Based on AT Commands
• Gives the attacker high levels of control to mobile
  phones
   –   Phone calls
   –   Text Messages (SMS)
   –   Phonebook entries (Reading/Writing)
   –   Call Forwards
• Flaw on the RFCOMM channels
   – Not announced over the Service Discovery Protocol (SDP)
   – RFCOMM protocol provides emulation of serial ports over the
     L2CAP protocol
Bluetooone
• Increasing the range
  by attaching a
  directional antenna
• Long Range attacks
• Not limited to 100
  meters distance
Bluesniper
• Tested at 1.1 miles in
  2004
Other Flaws
• Battery draining denial of service attack
  – Occupies channel
  – Drain battery from continuous scanning
Protection?
•   Turn off Bluetooth when not in use
•   Set to Non-Discoverable
•   Choose Random PIN numbers (16 Octets)
•   Confidential and Sensitive information should
    not be transmitted
Sources
•   Bluetooth.com
•   Bluetooth.org
•   Bluetooth Protocol Stack. thewirelessdirectory.com
•   Ellie, Jelly (2004). Why ‘bluejacking’? Bluejackq.com
•   Jakobsson, Markus. Security Weaknesses in Bluetooth. Lucent
          Technologies.
•   Laurie, Adam. (2003). Bluetooth Hacking – Full Disclosure.
          trifinite.org.
•   Laurie, Ben (2004). Bluetooth Security Briefs. thebunker.net
•   Vainio, Juha (2000). Bluetooth Security. Helsinki Univ.
•   Whitehouse, Ollie (2003). War Nibbling: Bluetooth Insecurity.
          @stake Research Report.

More Related Content

What's hot

IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
MuhammadAwaisQureshi6
 
Network topology
Network topologyNetwork topology
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
Ramasubbu .P
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
Akshita Pillai
 
Network switch
Network switchNetwork switch
Network switch
Ravinder Kaur
 
Bluetooth Network security
Bluetooth Network securityBluetooth Network security
Bluetooth Network security
vuttarkarrsreekanthr
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
Devdutta Chakrabarti
 
Hiperlan
HiperlanHiperlan
bluejacking
bluejackingbluejacking
bluejacking
Jyoti Chintadi
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
nareshkingster
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
Shantanu Krishna
 
Application development for the internet of things
Application development for the internet of thingsApplication development for the internet of things
Application development for the internet of things
Pankesh Patel
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
Naveen Sihag
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
Maulik Patel
 
Gsm based fire alert system
Gsm based fire alert systemGsm based fire alert system
Gsm based fire alert system
Nisha Kumari
 
Wimax / ieee 802.16
Wimax / ieee 802.16Wimax / ieee 802.16
Wimax / ieee 802.16
ankita pandey
 
Firewall ppt
Firewall pptFirewall ppt
Arduino Based Home Automation System with Android and
Arduino Based Home Automation System with Android andArduino Based Home Automation System with Android and
Arduino Based Home Automation System with Android and
Anish Basu
 
Network topology And Its Types
Network topology And Its Types Network topology And Its Types
Network topology And Its Types
Jaypee Institute of Information Technology
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
Deepak Kumar Dhal
 

What's hot (20)

IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 
Network topology
Network topologyNetwork topology
Network topology
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Network switch
Network switchNetwork switch
Network switch
 
Bluetooth Network security
Bluetooth Network securityBluetooth Network security
Bluetooth Network security
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
bluejacking
bluejackingbluejacking
bluejacking
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Application development for the internet of things
Application development for the internet of thingsApplication development for the internet of things
Application development for the internet of things
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
Gsm based fire alert system
Gsm based fire alert systemGsm based fire alert system
Gsm based fire alert system
 
Wimax / ieee 802.16
Wimax / ieee 802.16Wimax / ieee 802.16
Wimax / ieee 802.16
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Arduino Based Home Automation System with Android and
Arduino Based Home Automation System with Android andArduino Based Home Automation System with Android and
Arduino Based Home Automation System with Android and
 
Network topology And Its Types
Network topology And Its Types Network topology And Its Types
Network topology And Its Types
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 

Viewers also liked

Control system (II-ECE)
Control system (II-ECE)Control system (II-ECE)
Control system (II-ECE)
betasam
 
Carwhisperer Bluetooth Attack
Carwhisperer Bluetooth AttackCarwhisperer Bluetooth Attack
Carwhisperer Bluetooth Attack
n|u - The Open Security Community
 
Sku Brochure
Sku BrochureSku Brochure
Sku Brochure
SKU
 
Disaster management modified
Disaster management modifiedDisaster management modified
Disaster management modified
Madugula Kumar
 
Hijacking bluetooth headsets
Hijacking bluetooth headsetsHijacking bluetooth headsets
Hijacking bluetooth headsets
n|u - The Open Security Community
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
h_marvin
 
STREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENT
STREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENTSTREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENT
STREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENT
m sivareddy
 
Automatic irrigation 1st review(ieee project ece dept)
Automatic irrigation 1st review(ieee project ece dept)Automatic irrigation 1st review(ieee project ece dept)
Automatic irrigation 1st review(ieee project ece dept)
Siddappa Dollin
 
Automatic irrigation system ppt
Automatic irrigation system pptAutomatic irrigation system ppt
Automatic irrigation system ppt
Jagadeesh Kumar Duggineni
 
wimax Ppt for seminar
wimax Ppt for seminarwimax Ppt for seminar
wimax Ppt for seminar
Pratik Anand
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
shilpi nagpal
 

Viewers also liked (11)

Control system (II-ECE)
Control system (II-ECE)Control system (II-ECE)
Control system (II-ECE)
 
Carwhisperer Bluetooth Attack
Carwhisperer Bluetooth AttackCarwhisperer Bluetooth Attack
Carwhisperer Bluetooth Attack
 
Sku Brochure
Sku BrochureSku Brochure
Sku Brochure
 
Disaster management modified
Disaster management modifiedDisaster management modified
Disaster management modified
 
Hijacking bluetooth headsets
Hijacking bluetooth headsetsHijacking bluetooth headsets
Hijacking bluetooth headsets
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
STREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENT
STREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENTSTREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENT
STREET LIGHT THAT GLOWS ON DETECTING VEHICLE MOVEMENT
 
Automatic irrigation 1st review(ieee project ece dept)
Automatic irrigation 1st review(ieee project ece dept)Automatic irrigation 1st review(ieee project ece dept)
Automatic irrigation 1st review(ieee project ece dept)
 
Automatic irrigation system ppt
Automatic irrigation system pptAutomatic irrigation system ppt
Automatic irrigation system ppt
 
wimax Ppt for seminar
wimax Ppt for seminarwimax Ppt for seminar
wimax Ppt for seminar
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 

Similar to Bluetooth Vulnerabilities

Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
Muhammed Afsal Villan
 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
Felipe Prado
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
deepak kumar
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
punjab engineering college, chandigarh
 
THAT_2023_BLE.pdf
THAT_2023_BLE.pdfTHAT_2023_BLE.pdf
THAT_2023_BLE.pdf
Robin Schroeder
 
Bluetooth
BluetoothBluetooth
Bluetooth
Fahim Faysal
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
Deevena Dayaal
 
Bluetooth1
Bluetooth1Bluetooth1
Bluetooth1
Vikas Bansal
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.ppt
MEGHAB26
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
The Avi Sharma
 
Bluetooth
BluetoothBluetooth
Bluejacking ppt
Bluejacking pptBluejacking ppt
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
AdaCore
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
DrTThendralCompSci
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
Biagio Botticelli
 
Don Bailey - A Million Little Tracking Devices
Don Bailey  - A Million Little Tracking DevicesDon Bailey  - A Million Little Tracking Devices
Don Bailey - A Million Little Tracking Devices
Source Conference
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
DevMishra450797
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
Geethu Jose
 
Android Gadgets, Bluetooth Low Energy, and the WunderBar
Android Gadgets, Bluetooth Low Energy, and the WunderBarAndroid Gadgets, Bluetooth Low Energy, and the WunderBar
Android Gadgets, Bluetooth Low Energy, and the WunderBar
relayr
 
7952034.ppt
7952034.ppt7952034.ppt
7952034.ppt
AnubhavDas32
 

Similar to Bluetooth Vulnerabilities (20)

Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
THAT_2023_BLE.pdf
THAT_2023_BLE.pdfTHAT_2023_BLE.pdf
THAT_2023_BLE.pdf
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth1
Bluetooth1Bluetooth1
Bluetooth1
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.ppt
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 
Don Bailey - A Million Little Tracking Devices
Don Bailey  - A Million Little Tracking DevicesDon Bailey  - A Million Little Tracking Devices
Don Bailey - A Million Little Tracking Devices
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
 
Android Gadgets, Bluetooth Low Energy, and the WunderBar
Android Gadgets, Bluetooth Low Energy, and the WunderBarAndroid Gadgets, Bluetooth Low Energy, and the WunderBar
Android Gadgets, Bluetooth Low Energy, and the WunderBar
 
7952034.ppt
7952034.ppt7952034.ppt
7952034.ppt
 

Recently uploaded

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 

Recently uploaded (20)

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 

Bluetooth Vulnerabilities

  • 1. Bluetooth Vulnerabilities ECE 478 Winter 05 Victor Yee
  • 2. Topics • What is Bluetooth? • Eavesdropping • History • Impersonation • SIG • Cipher Vulnerabilities • Modes • Address • Bluejacking • Pairing • Bluesnarfing • Bluetooone • Bluesniper
  • 3. What is Bluetooth? • Wirelessly connect to – Wireless headsets – Handhelds – Personal computers – Printers – Mobile phones – Digital cameras – GPS receivers – Digital pens – Automobiles
  • 4. What is Bluetooth? • Short-range (10m-100m) wireless specification • Operating at 2.4GHz radio spectrum • Allows up to 7 simultaneous connections maintained by a signal radio. • Data transfers at least 2Mb/s
  • 5. History • Named from Danish King Harold Bluetooth from the 10th century – instrumental in uniting warring factions that is now Norway, Sweden, and Denmark • The logo was designed by a Scandinavian firm in which the runic character H & B were used
  • 6. SIG • Bluetooth Special Interest Group – Privately held trade associations made up of leaders • Telecom • Computing • Automotive • Industrial automation • Network industries. – They are marketing and advancing the development of the technology
  • 7. Bluetooth Protocol Stack • L2CAP - Logical Link Control and Adaptation Protocol • OBEX - Generalized Multi-Transport Object Exchange Protocol • RFCOMM - Serial Port Emulation • SDP - Service Discovery Protocol • TCS - Telephony Control protocol Specification
  • 8. Modes • Bluetooth devices can be in different modes – Discoverable • Device can be found by others searching in range – Connectable • Respond to messages from connected devices – Non-Discoverable – Non-Connectable
  • 9. Address • Bluetooth device address (MAC) – Unique identifier for the device for all communication – Device Access Code (DAC) is used to address the device – Channel Access Code (CAC) is used to identify the channel – DAC & CAC • Determined by device address • Not encrypted
  • 10. Address • Unique Address – Track and monitor behavior of user – Logs = Violation of privacy
  • 11. Security Modes • Mode 1 – No Security • Mode 2 – Application/Service based (L2CAP) • Mode 3 – Link-Layer • PIN Authentication • Address Security • encryption
  • 12. Security Modes • Difference between Mode 2 and Mode 3 – Bluetooth device initiates security procedures before the channel is established during Mode 3
  • 13. Security Modes • Different security Modes for devices and services – Devices (2 Levels) • Trusted Device – unrestricted access to all services • Untrusted Device – Services (3 Levels) • Require authorization and authentication • Require authentication only • Open to all devices
  • 14. How does Pairing Work? • Two Bluetooth devices need to pair up before data can be exchanged. • PIN consisting of numeric digits from 0-9 is established • Device sends a random number to the other device. • Both devices compute the initiation key based on a function of the shared PIN, Bluetooth device address that received the random number, and the random number.
  • 15. PIN • 0000 is default – 50% of used PINs are 0000 (Laziness) • 4 digits – 10,000 Possibilities
  • 16. Verification • Other device responds the computed computation back to the first device • First device compares the received value to its computed value if they are the same • Then the roles switch
  • 17. Eavesdropping • Attacker is able to listen to messages or data exchanged between devices. – No application layer encryption – Middle-person attack • Voice data between phone and headset • Obtain credit card information (Internet purchases) • Exhaustively guesses all PIN up to a certain length
  • 18. Impersonation • If PIN is known, Attacker is able to impersonate – Alter email responses (Internet Access) – Data to be printed (Printer)
  • 19. Cipher Vulnerabilities • 128 bit key can be broken in 2^64 • Divide-and-conquer attacks are not possible – Need access to key stream over long periods – Bluetooth has high resynchronization frequencies
  • 20. Bluejacking • Sending anonymous messages to another device without approval or authorization • Example – Tourists admirers Swedish handicrafts in a storefront window, cell phone chirped with an anonymous note: quot;Try the blue sweaters. They keep you warm in the winter.quot; Tourist is oblivious to who the sender is.
  • 21. Bluesnarfing • Snarf is network slang for unauthorized copy • Theft of Data, Calendar Information, Phonebook Contacts, Phone’s IMEI – Stolen IMEI can be used for cloning a phone • Attacker establishes connection without confirmation • Cell phones vulnerable to privacy invasion • Devices can be purchased on the Internet • Attackers exploit a flaw through OBEX Protocol using a PUSH Channel attack
  • 22. BlueBug • Based on AT Commands • Gives the attacker high levels of control to mobile phones – Phone calls – Text Messages (SMS) – Phonebook entries (Reading/Writing) – Call Forwards • Flaw on the RFCOMM channels – Not announced over the Service Discovery Protocol (SDP) – RFCOMM protocol provides emulation of serial ports over the L2CAP protocol
  • 23. Bluetooone • Increasing the range by attaching a directional antenna • Long Range attacks • Not limited to 100 meters distance
  • 24. Bluesniper • Tested at 1.1 miles in 2004
  • 25. Other Flaws • Battery draining denial of service attack – Occupies channel – Drain battery from continuous scanning
  • 26. Protection? • Turn off Bluetooth when not in use • Set to Non-Discoverable • Choose Random PIN numbers (16 Octets) • Confidential and Sensitive information should not be transmitted
  • 27. Sources • Bluetooth.com • Bluetooth.org • Bluetooth Protocol Stack. thewirelessdirectory.com • Ellie, Jelly (2004). Why ‘bluejacking’? Bluejackq.com • Jakobsson, Markus. Security Weaknesses in Bluetooth. Lucent Technologies. • Laurie, Adam. (2003). Bluetooth Hacking – Full Disclosure. trifinite.org. • Laurie, Ben (2004). Bluetooth Security Briefs. thebunker.net • Vainio, Juha (2000). Bluetooth Security. Helsinki Univ. • Whitehouse, Ollie (2003). War Nibbling: Bluetooth Insecurity. @stake Research Report.