Bluetooth Can Be Cracked!

Nothing is completely safe today. Adobe has recently released a patch for a security hole in different graphical software, so why should Bluetooth be safe?

... and Bluetooth isn't safe off course! ;)

Two researchers of the Tel Aviv University School of Electrical Engineering Systems say they have discovered a technique for taking control of Bluetooth-enabled mobile phones. After you've established a connection with an other cell phone, the attacker can easily make calls with your phone. If there is a Bluetooth connection with a PC, the hacker can even transfer data between his Bluetooth device / cell phone and the hacked computer. Bluetooth can be very dangerous as you can see! Even when the handsets have security features switched on, your cell phone isn't save at all!

Avishai Wool, senior lecturer and Yaniv Shaked, graduate student and both researchers of the Tel Aviv University School of Electrical Engineering Systems have published recently a paper about three methods for forcing a repeat of the pairing process, "Cracking the Bluetooth PIN" ( http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/ ). In this paper, a passive attack is described, in which an attacker can find the PIN used during the pairing process. The eye-opening conclusion of these two researchers: "Our results show that using algebraic optimizations, the most common Bluetooth PIN can be cracked within less than 0.06-0.3 seconds. If two Bluetooth devices perform pairing in a hostile area, they are vulnerable to this attack."

A Belgian Master student is making a fresh attempt to keep a list with Bluetooth security links on http://student.vub.ac.be/~sijansse/2e%20lic/BT/welcome.html.

Ollie Whitehousen security researcher of @stake, a digital security consulting firm ( http://www.atstake.com ) has written in October 2003 a paper that "examines methods of assessing the security of Bluetooth devices in relation to the protocol's design and implementation flaws" ( http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf ).

In general, the most critical point is the 'pairing' - connection procedure of two Bluetooth devices. When a Bluetooth device asks you to re-enter the PIN number for re-pairing, once the two devices are re-connected, the hacker can now easily crack the PIN code.

Links:

- http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf

- http://student.vub.ac.be/~sijansse/2e%20lic/BT/

- http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/

For feedback on this article, please visit http://wallies.info/blog/item/145/index.html

Walter V. is a self-employed internet entrepreneur and founder-webmaster of several websites, including
wallies.info :: A snappy blog about snappy blue things :: blog | wiki | forum | links - http://wallies.info
mblo.gs :: A snappy moblog community - http://mblo.gs

In The News:


pen paper and inkwell


cat break through


Easy to Execute!

Plug and play equipment or hardware solves the problem of... Read More

HIPPA Goes Mobile and Wireless for Hospitals and First Responders

It appears we need to further streamline health care and... Read More

LCD Monitors: A Catching-On Technology

If you've been in the market for a new computer... Read More

JunxionBox -- WiFi Access Everywhere

Now you can more easily access the Internet wherever mobile... Read More

The Benifits of Assembling Your Own Computer

Thinking about getting a new computer, but with all the... Read More

Cisco CCNA Certification: Why You NEED Hands-On Practice !

CCNA and CCNP candidates hear it all the time: "you... Read More

What Everybody Should Know About An Inkjet Printer: The One-Year Cost Of Printing

You can purchase an inkjet printer for as little as... Read More

Testing a Transformer- How To Accurately Test A Transformer

There is two types of transformers in the market- linear... Read More

You Can Prevent Computer Slowdowns & Issues

Most people understand preventive maintenance like changing the oil in... Read More

Used Laptop Computer: Your Quick Purchase Inspection Guide ? Part 3

Used laptop computers are everywhere these days. How can you... Read More

Printer Cartridges - Step Back in History

You are working and trying to print out important documents... Read More

Learn About The Three Basic Types Of Computer Mouse

1) Mechanical: This is a type of computer mouse that... Read More

Types Of Laptop Batteries

Throughout the years there have been many technologies involved with... Read More

How to Avoid Getting Ripped-Off When You Purchase A New Printer

It's no big secret that printer companies like HP and... Read More

Setting up a Tape Backup Strategy for your Business

So you know a little bit about tape backup, but... Read More

War of the Disks: A Close-in Analysis of the Hard Disk Drive vs. the Solid State Disk

Much has been written about solid state disks (SSDs) becoming... Read More

USB Hubs and Ports Explained

The USB standard has become the universal means of connection... Read More

Where Can I Find The Best Case Mods Online and Save Money?

Are you captivated by the stunning Case Mods you've seen... Read More

How To Format A Hard Drive

Here's how to format a hard drive (Legal Stuff: We... Read More

Toner Cartridges - How They Work

In the past computers and their accompanying printers were huge.... Read More

Obsolete Is A Dirty Word (Intel Pentium 64 Bit Microchip)

Get ready everyone, home computers are about to set new... Read More

How To Buy A Printer That Won?t Break The Bank

OK I confess I've bought at least 10 inkjet printers... Read More

Digital Camera Prints - Getting the Most for Your Money

Digital cameras have really taken off in popularity in recent... Read More

Just The Fax, M?am

For years, I smugly prided myself as a non-fax machine... Read More

Thin Clients Benefits are Excellent Options for Computer Homeschools... Just a Suggestion

Wireless Consulting and Solution Providers have always been important to... Read More

The Printer Cartridge Wars: Generic or Remanufactured Cartridges Right for You?

OverviewAs "generic", "remanufactured", and "new compatible" inkjet printer cartridges and... Read More

Surge Protector: A Simple Mechanism Description

A surge protector [AKA surge suppressor] is an electrical plug-in... Read More

A Review of Refurbished Toshiba Laptops

Toshiba offers a few of their refurbished laptops in the... Read More

Got The Message that You Need New Ink Cartridges?

We all know what it is like when that message... Read More

Advanced Tips on Speeding Up Your PC

Other then keeping your HDD free of viruses, spyware, and... Read More

Inkjet Jargon Explained

With all the technical terms out there, it is becoming... Read More

The Merging of Humans and Computers

Soon the human brain will be completely interfaced with the... Read More

Batteries for Your Laptop

With technology advancing more every day, electronics have become smaller... Read More