Penetration Testing mailing list archives

RE: Attacking computers over Bluetooth


From: "Miller, Joseph A" <joseph.miller () eds com>
Date: Wed, 3 Aug 2005 16:19:10 -0400

Chris,

http://www.niksula.cs.hut.fi/~jiitv/bluesec.html covers the risk per
security from the "information leakage" path... Crypto, etc...

As far as having buffer overflows, etc in implementations..? If that is
your question.. Where there is code, there are often errors. I doubt
anyone with unpublished exploits is going to post anything more about
it.

If it's accessible, I'd say it is at risk. At least until a few
"assessments" are performed, both black/white box. It's not any
different than any other wired/wireless device.

-----Original Message-----
From: Chris Byrd [mailto:cbyrd01 () gmail com] 
Sent: Wednesday, August 03, 2005 11:15 AM
To: pen-test () securityfocus com
Subject: Attacking computers over Bluetooth

I have been able to locate a lot of information about attacking devices
such as phones and PDAs via Bluetooth, including a lot of great
information at trifinite.org.  What I am unable to determine is the
extent to which a computer can be compromised using the same methods.

Does anyone on the list have experience pentesting Bluetooth enabled
computers?  To what extent is a computer that has built in Bluetooth or
an add-in adapter at risk?

Thanks,

Chris

------------------------------------------------------------------------
------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You
Don't

Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:

http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
------------------------------------------------------------------------
-------


------------------------------------------------------------------------------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't

Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:

http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
-------------------------------------------------------------------------------


Current thread: