SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Carwhisperer
Bluetooth Attack
What is Bluetooth??
• Bluetooth is “A specification for short-range radio
  links between mobile phones, mobile computers,
  digital cameras, and other portable devices.”
• Enables users to establish ad hoc networks
  supporting voice and data communications
History



• It has been called after Harald Blatand (Harald
  bluetooth), the king of Denmark.
• The Bluetooth wireless technology was invented in
  1994 by Ericsson
• In September 1998, the Bluetooth Special Interest
  Group (SIG) was founded with the objective of
  developing the Bluetooth wireless technology
Bluetooth Basics

• Bluetooth operates in the licensed-free ISM band
  between 2.4 and 2.48 GHz.
• For Prevention of interference with other devices working
  within ISM, Bluetooth make use of a technique called
  frequency hopping.
• It takes 1600 hops/sec
• It has 79 base band frequencies
• Bluetooth is a connection oriented service.
Bluetooth Basics(Continued)

• In order to connect two Bluetooth devices, one of them,
  normally the device initiating the connection, elevates to
  the master, leaving the second device as a slave.
• Piconet
• Scatternet
• ACL (Asynchronous connection-oriented) and SCO
  (Synchronous connection-less)
• Data rates up to 3 Mb/s
• Typical communication range is 10 to100 meters
Bluetooth Topology (ACL link)
Bluetooth Topology (SCO/eSCO link)
Master-Slave Architecture




• In Bluetooth, connections with up to seven devices,
  which form piconet are possible, where communication is
  led by the master device.
Bluetooth Services

• Bluetooth makes use of a protocol stack, which makes it
  simple to separate application logic from physical data
  connections.

• The protocol architecture of Bluetooth allows for straight
  forward implementation of existing network protocols
  like HTTP, FTP, etc.
Bluetooth Radio & Baseband
• Bluetooth Radio work as a digital signal processing
  component of the system
• Bluetooth device transmit data, which is made up of bits
  (ones and zeros), over a radio frequency
• Baseband processes the signal received and transmitted
  by Radio
• Controls links, packets, error and flow
LMP & HCI
• LMP manages link setup, authentication, link
  configuration and other low level protocols
• Connection establishment
• HCI provides command interface to the baseband
  controller and link manager
• Exists across three sections, the host, transport layer and
  the host controller
L2CAP & RFCOMM
• L2CAP provides connection-oriented and connection-
  less data services to upper layer protocols
• Permits protocols and applications to transmit and
  receive data packets up to 64 kilobytes in length
• RFCOMM protocol supports 60 simultaneous connection
  between two Bluetooth devices
• The number of connections that can be used
  simultaneously in a bluetooth device is implementation
  specific, meaning what profile is being used
SDP-Service Discovery Protocol

• Bluetooth is a technology, which is deployed in a
  dynamical environment. Devices may get out of range or
  even switched on, while new devices might become
  activated.

• In order to detect services, provided by other devices, a
  protocol, which detects services makes sense. In
  Bluetooth, the Service Discovery Protocol is responsible
  for keeping track of services, provided within a device’s
  operating range
TCS - Telephony Control Protocol

• The Telephony Control Protocol provides functionality to
  control telephony applications and makes use of L2CAP
  connections.
OBEX - Object Exchange Protocol

• The Object Exchange Protocol (OBEX) provides services
  for the exchange of binary data objects. To initiate an
  OBEX session, an optional OBEX authentication is
  possible.



• Therefore, a limited set of commands like PUT, GET or
  ABORT exist for easy file transfers, comparable to HTTP.
Bluetooth Profiles

• In Bluetooth, provided services are composed to a
  Bluetooth Profile. Bluetooth devices communicate via the
  profiles, that act as ”interfaces”.

• For further consideration, two Bluetooth profiles are
  especially interesting, concerning BlueSnarfing and
  BlueBugging attacks:
   1. OBEX Object Push Profile (OPP).
   2. Synchronisation Profile (SYNCH).
OBEX Object Push Profile (OPP)

• The Object Push Profile (OPP) provides basic functions
  for exchange of binary objects, mainly used for vCards in
  Bluetooth.

• vCard is a file format standard for electronic business
  cards.

• Since vCards are not worth being especially protected, no
  authorization procedure is performed before OPP
  transactions. Supported OBEX commands are connect,
  disconnect, put , get and abort.
Synchronization Profile (SYNCH)

• The Synchronization Profile (SYNCH) provides functions
  for exchange of Personal Information Manager (PIM)
  data and was adopted from the IrDA infrared
  specification.



• In Bluetooth, especially private data, like the address
  book, calendar, etc. is sent using the SYNCH profile.
Overview On Bluetooth Security

• Security within Bluetooth itself covers three major
  areas:
      – Authentication
      – Authorization
      – Encryption

• Security levels:
      – Silent
      – Private
      – Public
Thank You !!

Weitere ähnliche Inhalte

Was ist angesagt?

Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation harshit chavda
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacyPushkar Dutt
 
Line configuration
Line configurationLine configuration
Line configurationAshish Vats
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)Kalpesh Kalekar
 
M2M Communication
M2M CommunicationM2M Communication
M2M CommunicationFabMinds
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io tShilpaKrishna6
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architectureYisal Khan
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Samip jain
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdfJoshuaKimmich1
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed systemSunita Sahu
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 

Was ist angesagt? (20)

Firewall
FirewallFirewall
Firewall
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Hybrid wireless protocols
Hybrid wireless protocolsHybrid wireless protocols
Hybrid wireless protocols
 
Line configuration
Line configurationLine configuration
Line configuration
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Sdn ppt
Sdn pptSdn ppt
Sdn ppt
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
IoT & M2M.pdf
IoT & M2M.pdfIoT & M2M.pdf
IoT & M2M.pdf
 
M2M Communication
M2M CommunicationM2M Communication
M2M Communication
 
IoT transport protocols
IoT transport protocolsIoT transport protocols
IoT transport protocols
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io t
 
Gsm radio-interface
Gsm radio-interfaceGsm radio-interface
Gsm radio-interface
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architecture
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
Key management
Key managementKey management
Key management
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
Unit 3 - URLs and URIs
Unit 3 - URLs and URIsUnit 3 - URLs and URIs
Unit 3 - URLs and URIs
 

Andere mochten auch

Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7gnkeshava
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth VulnerabilitiesVictorYee
 
About BLE server profile
About BLE server profile About BLE server profile
About BLE server profile Lin Steven
 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementationStanley Chang
 
Attacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocolAttacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocolCysinfo Cyber Security Community
 
Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1 Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1 NFC Forum
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Securityh_marvin
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyFReeze FRancis
 
Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2NFC Forum
 

Andere mochten auch (10)

Hijacking bluetooth headsets
Hijacking bluetooth headsetsHijacking bluetooth headsets
Hijacking bluetooth headsets
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
 
About BLE server profile
About BLE server profile About BLE server profile
About BLE server profile
 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementation
 
Attacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocolAttacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocol
 
Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1 Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
 
Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2
 

Ähnlich wie Carwhisperer Bluetooth Attack

Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technologySuman Bhattacharyya
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesMukesh Chinta
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basicEngr Sid
 
SEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotSEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotKamonasish Hore
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & SecurityHimangshu Hazra
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.pptssuser1d7ef1
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-securityAnand Dhana
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetoothSonali Parab
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindikvsevindik
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in BluetoothSonali Parab
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layersJay Nagar
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfshubhangisonawane6
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetoothvish0110
 

Ähnlich wie Carwhisperer Bluetooth Attack (20)

Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
SEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotSEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth Hotspot
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layers
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Mehr von n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptxmary850239
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Objectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxObjectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxMadhavi Dharankar
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxAvaniJani1
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsArubSultan
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfChristalin Nelson
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 

Kürzlich hochgeladen (20)

Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Objectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxObjectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristics
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdf
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 

Carwhisperer Bluetooth Attack

  • 2. What is Bluetooth?? • Bluetooth is “A specification for short-range radio links between mobile phones, mobile computers, digital cameras, and other portable devices.” • Enables users to establish ad hoc networks supporting voice and data communications
  • 3. History • It has been called after Harald Blatand (Harald bluetooth), the king of Denmark. • The Bluetooth wireless technology was invented in 1994 by Ericsson • In September 1998, the Bluetooth Special Interest Group (SIG) was founded with the objective of developing the Bluetooth wireless technology
  • 4. Bluetooth Basics • Bluetooth operates in the licensed-free ISM band between 2.4 and 2.48 GHz. • For Prevention of interference with other devices working within ISM, Bluetooth make use of a technique called frequency hopping. • It takes 1600 hops/sec • It has 79 base band frequencies • Bluetooth is a connection oriented service.
  • 5. Bluetooth Basics(Continued) • In order to connect two Bluetooth devices, one of them, normally the device initiating the connection, elevates to the master, leaving the second device as a slave. • Piconet • Scatternet • ACL (Asynchronous connection-oriented) and SCO (Synchronous connection-less) • Data rates up to 3 Mb/s • Typical communication range is 10 to100 meters
  • 8. Master-Slave Architecture • In Bluetooth, connections with up to seven devices, which form piconet are possible, where communication is led by the master device.
  • 9. Bluetooth Services • Bluetooth makes use of a protocol stack, which makes it simple to separate application logic from physical data connections. • The protocol architecture of Bluetooth allows for straight forward implementation of existing network protocols like HTTP, FTP, etc.
  • 10.
  • 11. Bluetooth Radio & Baseband • Bluetooth Radio work as a digital signal processing component of the system • Bluetooth device transmit data, which is made up of bits (ones and zeros), over a radio frequency • Baseband processes the signal received and transmitted by Radio • Controls links, packets, error and flow
  • 12. LMP & HCI • LMP manages link setup, authentication, link configuration and other low level protocols • Connection establishment • HCI provides command interface to the baseband controller and link manager • Exists across three sections, the host, transport layer and the host controller
  • 13. L2CAP & RFCOMM • L2CAP provides connection-oriented and connection- less data services to upper layer protocols • Permits protocols and applications to transmit and receive data packets up to 64 kilobytes in length • RFCOMM protocol supports 60 simultaneous connection between two Bluetooth devices • The number of connections that can be used simultaneously in a bluetooth device is implementation specific, meaning what profile is being used
  • 14. SDP-Service Discovery Protocol • Bluetooth is a technology, which is deployed in a dynamical environment. Devices may get out of range or even switched on, while new devices might become activated. • In order to detect services, provided by other devices, a protocol, which detects services makes sense. In Bluetooth, the Service Discovery Protocol is responsible for keeping track of services, provided within a device’s operating range
  • 15. TCS - Telephony Control Protocol • The Telephony Control Protocol provides functionality to control telephony applications and makes use of L2CAP connections.
  • 16. OBEX - Object Exchange Protocol • The Object Exchange Protocol (OBEX) provides services for the exchange of binary data objects. To initiate an OBEX session, an optional OBEX authentication is possible. • Therefore, a limited set of commands like PUT, GET or ABORT exist for easy file transfers, comparable to HTTP.
  • 17. Bluetooth Profiles • In Bluetooth, provided services are composed to a Bluetooth Profile. Bluetooth devices communicate via the profiles, that act as ”interfaces”. • For further consideration, two Bluetooth profiles are especially interesting, concerning BlueSnarfing and BlueBugging attacks: 1. OBEX Object Push Profile (OPP). 2. Synchronisation Profile (SYNCH).
  • 18. OBEX Object Push Profile (OPP) • The Object Push Profile (OPP) provides basic functions for exchange of binary objects, mainly used for vCards in Bluetooth. • vCard is a file format standard for electronic business cards. • Since vCards are not worth being especially protected, no authorization procedure is performed before OPP transactions. Supported OBEX commands are connect, disconnect, put , get and abort.
  • 19. Synchronization Profile (SYNCH) • The Synchronization Profile (SYNCH) provides functions for exchange of Personal Information Manager (PIM) data and was adopted from the IrDA infrared specification. • In Bluetooth, especially private data, like the address book, calendar, etc. is sent using the SYNCH profile.
  • 20. Overview On Bluetooth Security • Security within Bluetooth itself covers three major areas: – Authentication – Authorization – Encryption • Security levels: – Silent – Private – Public
  • 21.
  • 22.
  • 23.
  • 24.