Penetration Testing mailing list archives
RE: Attacking computers over Bluetooth
From: "Miller, Joseph A" <joseph.miller () eds com>
Date: Wed, 3 Aug 2005 16:19:10 -0400
Chris, http://www.niksula.cs.hut.fi/~jiitv/bluesec.html covers the risk per security from the "information leakage" path... Crypto, etc... As far as having buffer overflows, etc in implementations..? If that is your question.. Where there is code, there are often errors. I doubt anyone with unpublished exploits is going to post anything more about it. If it's accessible, I'd say it is at risk. At least until a few "assessments" are performed, both black/white box. It's not any different than any other wired/wireless device. -----Original Message----- From: Chris Byrd [mailto:cbyrd01 () gmail com] Sent: Wednesday, August 03, 2005 11:15 AM To: pen-test () securityfocus com Subject: Attacking computers over Bluetooth I have been able to locate a lot of information about attacking devices such as phones and PDAs via Bluetooth, including a lot of great information at trifinite.org. What I am unable to determine is the extent to which a computer can be compromised using the same methods. Does anyone on the list have experience pentesting Bluetooth enabled computers? To what extent is a computer that has built in Bluetooth or an add-in adapter at risk? Thanks, Chris ------------------------------------------------------------------------ ------ FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't Learn the hacker's secrets that compromise wireless LANs. Secure your WLAN by understanding these threats, available hacking tools and proven countermeasures. Defend your WLAN against man-in-the-Middle attacks and session hijacking, denial-of-service, rogue access points, identity thefts and MAC spoofing. Request your complimentary white paper at: http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801 ------------------------------------------------------------------------ ------- ------------------------------------------------------------------------------ FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't Learn the hacker's secrets that compromise wireless LANs. Secure your WLAN by understanding these threats, available hacking tools and proven countermeasures. Defend your WLAN against man-in-the-Middle attacks and session hijacking, denial-of-service, rogue access points, identity thefts and MAC spoofing. Request your complimentary white paper at: http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801 -------------------------------------------------------------------------------
Current thread:
- Attacking computers over Bluetooth Chris Byrd (Aug 03)
- <Possible follow-ups>
- RE: Attacking computers over Bluetooth Miller, Joseph A (Aug 03)