Popular Posts

Saturday, December 11, 2010

What is bluetooth hacking

What is bluetooth? 
Bluetooth is a form of wireless communication and can be used to pass information to Bluetooth-enabled devices such as mobile phones.

Bluetooth is an excellent protocol for wireless communication because it's capable of transmitting data at nearly 1MB/s, while consuming 1/100th of the power of Wi-Fi.

There are no charges for delivering a message using Bluetooth unlike using SMS text messaging. 



What is then bluetooth hacking?

Blue-tooth hacking is hacking the other device without the knowing that device.It is also know as Bluesnarfing. Blue-tooth hacking not only limited to cell phones ,but it can also hacked the desktop computers, laptops etc. 

Their are types of blue-tooth hacking –
1.Bluesnarfing
2.Bluejacking
3.Bluebugging

1.Bluesnarfing 

 It is same as the bluetooth hacking. Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages, and on some phones users can copy pictures and private videos. Currently available programs must allow connection and to be 'paired' to another phone to copy content. There may be other programs that can break into the phones without any control, but if they exist they are not made publicly available by the developer. One instance of Bluesnarfing software that was demonstrated (but never made available for download) utilized weaknesses in the Bluetooth connection of some phones. This weakness has since been patched by the Bluetooth standard. There seem to be no available reports of phones being Bluesnarfed without pairing, since the patching of the Bluetooth standard.

2.Bluejacking

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another bluetooth enabled device via the OBEX protocol.
3.Bluebugging

Bluebugging was first discovered by the German researcher named Herfurt. His Bluebug program allowed the user to ultimately take control of a victim's phone, which, in turn could be used to call the user's phone. In other words, this meant that the Bluebug user could simply listen to any conversation his/her victim was having in real life/time. In addition, this program allowed for the ability to create a call forwarding application whereby the user could receive calls intended for his/her victim.

hacking a bluetooth device is done by using some short of brute force methods and some luck. 

1 comment:

  1. awesome article
    OMG
    my N900's bluetooth is on!
    ;-)

    ReplyDelete

If you have any suggestion or comments or want to ask something feel free to share you views