Bluetooth Hacking: A Case Study
نویسندگان
چکیده
This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.
منابع مشابه
Hybrid Model for Detecting Malware in Mobile Networks with Heterogeneous Devices
Malware attacks become more frequently in cellular networks (i e., viruses, worms, and also other malicious software). Spyware which disturbs your network computer function, hacking the hypersensitive information and accesses your private systems. It is only a program that's specifically designed to be able to injure the computer it can be a virus or perhaps worm. Mobile malware can propagate v...
متن کاملHybrid Model for Detecting Viruses in Mobile Networks
Malware is malicious software which disturbs the network computer operation, hacking the sensitive information and accesses the private systems. It is nothing but a program which is specifically designed to injure the computer it may be a virus or worm. So, in order to overcome this problem a two-layer network model is presented for simulating virus propagation through both Bluetooth and SMS. T...
متن کاملA Hands-on Approach for Teaching Denial of Service Attacks: A Case Study
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality, integrity, and availability of computer systems...
متن کاملCharacterizing Google Hacking: A First Large-Scale Quantitative Study
Google Hacking continues to be abused by attackers to find vulnerable websites on current Internet. Through searching specific terms of vulnerabilities in search engines, attackers can easily and automatically find a lot of vulnerable websites in a large scale. However, less work has been done to study the characteristics of vulnerabilities targeted by Google Hacking (e.g., what kind of vulnera...
متن کاملCase Study Resources for an Ethics and Computing Course
Case studies can be an e ective part of an ethics and computing course. However, it is often time-consuming for the instructor to build a list of good case studies. This is especially true if the instructor wants to use real-life incidents for the cases. Even for the instructor who prefers to use "anonymized" or "synthetic" case studies, a compilation of real incidents provides a good starting ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JDFSL
دوره 4 شماره
صفحات -
تاریخ انتشار 2009