Bluetooth Hacking: A Case Study

نویسندگان

  • Dennis Browning
  • Gary C. Kessler
چکیده

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hybrid Model for Detecting Malware in Mobile Networks with Heterogeneous Devices

Malware attacks become more frequently in cellular networks (i e., viruses, worms, and also other malicious software). Spyware which disturbs your network computer function, hacking the hypersensitive information and accesses your private systems. It is only a program that's specifically designed to be able to injure the computer it can be a virus or perhaps worm. Mobile malware can propagate v...

متن کامل

Hybrid Model for Detecting Viruses in Mobile Networks

Malware is malicious software which disturbs the network computer operation, hacking the sensitive information and accesses the private systems. It is nothing but a program which is specifically designed to injure the computer it may be a virus or worm. So, in order to overcome this problem a two-layer network model is presented for simulating virus propagation through both Bluetooth and SMS. T...

متن کامل

A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study

Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality, integrity, and availability of computer systems...

متن کامل

Characterizing Google Hacking: A First Large-Scale Quantitative Study

Google Hacking continues to be abused by attackers to find vulnerable websites on current Internet. Through searching specific terms of vulnerabilities in search engines, attackers can easily and automatically find a lot of vulnerable websites in a large scale. However, less work has been done to study the characteristics of vulnerabilities targeted by Google Hacking (e.g., what kind of vulnera...

متن کامل

Case Study Resources for an Ethics and Computing Course

Case studies can be an e ective part of an ethics and computing course. However, it is often time-consuming for the instructor to build a list of good case studies. This is especially true if the instructor wants to use real-life incidents for the cases. Even for the instructor who prefers to use "anonymized" or "synthetic" case studies, a compilation of real incidents provides a good starting ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JDFSL

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2009