Bluetooth Can Be Cracked!

Nothing is completely safe today. Adobe has recently released a patch for a security hole in different graphical software, so why should Bluetooth be safe?

... and Bluetooth isn't safe off course! ;)

Two researchers of the Tel Aviv University School of Electrical Engineering Systems say they have discovered a technique for taking control of Bluetooth-enabled mobile phones. After you've established a connection with an other cell phone, the attacker can easily make calls with your phone. If there is a Bluetooth connection with a PC, the hacker can even transfer data between his Bluetooth device / cell phone and the hacked computer. Bluetooth can be very dangerous as you can see! Even when the handsets have security features switched on, your cell phone isn't save at all!

Avishai Wool, senior lecturer and Yaniv Shaked, graduate student and both researchers of the Tel Aviv University School of Electrical Engineering Systems have published recently a paper about three methods for forcing a repeat of the pairing process, "Cracking the Bluetooth PIN" ( http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/ ). In this paper, a passive attack is described, in which an attacker can find the PIN used during the pairing process. The eye-opening conclusion of these two researchers: "Our results show that using algebraic optimizations, the most common Bluetooth PIN can be cracked within less than 0.06-0.3 seconds. If two Bluetooth devices perform pairing in a hostile area, they are vulnerable to this attack."

A Belgian Master student is making a fresh attempt to keep a list with Bluetooth security links on http://student.vub.ac.be/~sijansse/2e%20lic/BT/welcome.html.

Ollie Whitehousen security researcher of @stake, a digital security consulting firm ( http://www.atstake.com ) has written in October 2003 a paper that "examines methods of assessing the security of Bluetooth devices in relation to the protocol's design and implementation flaws" ( http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf ).

In general, the most critical point is the 'pairing' - connection procedure of two Bluetooth devices. When a Bluetooth device asks you to re-enter the PIN number for re-pairing, once the two devices are re-connected, the hacker can now easily crack the PIN code.

Links:

- http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf

- http://student.vub.ac.be/~sijansse/2e%20lic/BT/

- http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/

For feedback on this article, please visit http://wallies.info/blog/item/145/index.html

Walter V. is a self-employed internet entrepreneur and founder-webmaster of several websites, including
wallies.info :: A snappy blog about snappy blue things :: blog | wiki | forum | links - http://wallies.info
mblo.gs :: A snappy moblog community - http://mblo.gs

In The News:


pen paper and inkwell


cat break through


The Merging of Humans and Computers

Soon the human brain will be completely interfaced with the... Read More

Testing Flyback Transformer - How to Test and When to Replace It

Nowadays, more and more monitor comes in with flyback transformers... Read More

Buying Cheap Refurbished Laptops

When comparing refurbished laptop models, ask about these specifications:Central Processing... Read More

Refurbished Laptops are the Real Deal!

Laptop computers have found usefulness as portable media devices.Even refurbished... Read More

Flash Memory Part 2: MMC and SD

MMC and SDFlash memory is available in so many formats... Read More

Correctional Institution Preventive Maintenance Software

There is a great need for preventive maintenance in correctional... Read More

A Review of Refurbished Toshiba Laptops

Toshiba offers a few of their refurbished laptops in the... Read More

10 Solid Reasons To Make Your Next PC A Notebook

Notebook computers are becoming very popular. They seem to be... Read More

Learn About The Three Basic Types Of Computer Mouse

1) Mechanical: This is a type of computer mouse that... Read More

Learn to Find Cheap Laptop Computers on the Internet

Cheap laptop computers are coming to a store near you.... Read More

Computer Parts Online

In today's age, building computers on yourself is often chosen... Read More

Laptop Computers and the PVP Effect!

Roll over lumbering desktop computers, the limber laptop is here,... Read More

Routing, Routed, and Non-Routable Protocols

ROUTING PROTOCOLSA generic term that refers to a formula, or... Read More

How to Check Your IP

So you need to check your IP address, for whatever... Read More

What is EEPROM ?

EEPROM stands for Electrical Erasable Programmable Read Only Memory and... Read More

Selecting an Ink Jet printer?With Low Operating Cost

Printer technology has made tremendous advances in the past five... Read More

Understanding Transistor Data and Replacement

If, for some reason, you can't get an exact replacement... Read More

The Hard Disk

From throwing our unnecessary files, to defragmenting, from partitions to... Read More

What to Do Once You Are Infected with Spyware, Ad-ware or Viruses

What to do once your PC is infected with spyware,... Read More

Building A PC

Many people simply go to the retail store and get... Read More

DVD Media

DVD is an optical disc storage media format that can... Read More

Adding USB 2.0

The process of adding USB 2.0 ports took no time... Read More

DVD ROMs

DVD CD ROMs have become predominantly the most used CD... Read More

When Good Color Goes Bad...

Even with the popularity of digital technology, and the availability... Read More

Selecting a Laptop

Small Can Be BeautifulWhen purchasing a new computer, you may... Read More

Inexpensive Radius Server Gives Wireless Networks The Security They Need

Many small businesses have considered connecting computers and other devices... Read More

Used Laptop Computer: Your Quick Purchase Inspection Guide ? Part 1

Used laptop computers are everywhere these days. How can you... Read More

Survey of Both Past and Modern Printers

Printers are on-line devices initially categorised as being either impact... Read More

Be Free with Wireless Speakers

Are you tired of laying wires through your house, creeping... Read More

How to Choose The Right Laptop Accessories?

The notebook computer is coming of age. For the first... Read More

Expansion Cards Part 2: AGP

Expansion Cards Part 2: AGPThe first in this series of... Read More

Wireless Networking, Part 1: Capabilities and Hardware

Wireless Networking, Part 1: Capabilities and HardwareThese days it isn't... Read More

A Guide to Refurbished Laptops

Computing freedom, independence, and mobility don't have to come with... Read More