Bluetooth hacking tricks




















Initially focused on the development of antivirus software, the company has since expanded its line of business to advanced cyber-security services with technology for preventing cyber-crime. Every bluetooth file transfer app i know of requires the user to accept the file, and then you need to actually open the file for anything to happen.

That was my thinking…. Your email address will not be published. Mobile News Security How hackers are targeting your phone through Bluetooth March 29, 2 minute read. How does Bluetooth hacking work? What else could happen?

Where can this occur? What does bluebugging look like? What can you do to keep safe? Panda Security Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

You May also Like View Post. View Post. You can hook up a more powerful dipole antenna and get better range out of it in a field setting, but frankly, the Ubertooth performs best in a controlled lab environment. The Nordic Semiconductor nRFDK device is a pretty good Bluetooth transmitter and receiver, with the sniffing abilities working better than expected. Like the Ubertooth, it is programmable, but the out-of-the-box firmware is fine for most quick hacker work, including sniffing.

The range is limited, but the quality is high. Nordic Semiconductor supplies a lot of the chips and hardware solutions in IoT, so they tend to make inexpensive hardware to help developers test their creations. Figure 5. This thing was made for serious developers and hackers alike. While the Ubertooth might have a slight advantage as far as distance goes, this is a great USB device for the lab. Due to the amount of designers and developers building IoT devices and writing IoT software for the various chipsets that Nordic Semiconductor makes, the community support for this device is rapidly growing.

Figure 6. Why do these high-end tools cost so much? Because they work so well. The high-end machines work differently, by simply grabbing the entire Bluetooth spectrum at once, capturing everything. Specialized software is used to help control the device and read the captured data, and typically only runs on Windows. These devices are built for lab work, but one could easily add beefier antennas, and, as long as they can meet the power requirements, this could be considered an excellent field device as well some high-end models are even marketed that way - built for both lab and field.

For the Linux hacker, it is all about the command line interface CLI. There are plenty of CLI tools for Bluetooth and many of them provide useful information, although not all of them provide output in any consistent manner.

Here are a number of tools commonly used by researchers there are others, this is a sampling of the more popular ones used in Labs, check their main pages or run them with the -? Just be prepared for multiple tries and some patience, and when completed, you will have a nice pcap-formatted output file to analyze.

While doing field work, you sometimes wonder if you should even bother getting out your laptop and setting up your dongles.

Sometimes it helps to have a quick way to look at the traffic, and it is even better if it returns useful information - saving you time with what to focus on once you get the laptop out. There are a number of free applications for your phone that will help with this. Some of the free apps have mixed results, but a basic guideline for choosing one is to select them by the developer.

There are a number of companies that sell tools for building various applications or IoT devices or both that write decent free Bluetooth apps for testing from your phone. These are usually fairly high quality because they are intended to complement your development process while using their purchased products. Figure 7. From the above, you can see it is useful in finding unusual items. This was captured mid-flight during a business trip. Figure 8.

Excellent app with decent logging capabilities. Most of the hardware and even some of the software comes with Wireshark plugins compile and install all of them. While there are too many to name and plan for, there are some general rules to keep in mind. Read the documentation, but note the date.

If the instructions are old and refer to an old version of Wireshark, it is possible that the plugin comes included with the newer version of Wireshark. Most plugins will compile without incident with a newer version of Wireshark. In fact, most will compile with the Wireshark development package for your Linux version, for example, wireshark-dev on Ubuntu.

The purpose of the plugins is simply to interpret the raw Bluetooth packets inside the Wireshark app into something a little more readable, and since there are multiple protocols involved with Bluetooth, it helps to make some sense out of what is going on.

There are often a couple of different ways to sniff Bluetooth - directly within Wireshark and with one of the command line tools itself. For example, Ubertooth includes the aforementioned ubertooth-btle, which allows capturing of Bluetooth traffic and saving the data in pcap format that Wireshark can read and interpret with the appropriate plugins. And you can use more than one Bluetooth source during sniffing within Wireshark.

Even the strongest cryptographic protocol has been known to fail due to the random number generator not being "random enough. Thus, it can be said that the security of BLE lies in the hands if its implementers. While all Bluetooth Low Energy devices were developed with the principal motive of enhancing user experience, did security take a backseat during the process? This is responsible for the connections and advertising in BLE.

GAP is responsible for the visibility of a device to the external world and also plays a major role in determining how the device interacts with other devices. The following two concepts are integral to GAP:. Peripheral devices : These are small and low energy devices that can connect with complex, more powerful central devices. Heart rate monitor is an example of a peripheral device. Central devices : These devices are mostly cell phones or gadgets that have an increased memory and processing power.

The peripheral device will send an advertising data once every 2 seconds. If the central device is ready to listen to the advertisement packets, it will respond with a scan response request. In response to this request, the peripheral device will send a scan response data. Thus, the central and peripheral device gets advertised and connected with each other.

Making use of a generic data protocol known as Attribute Protocol, GATT determines how two BLE devices exchange data with each other using concepts - service and characteristic.

This protocol stores all the service and characteristic in a lookup table using a 16 bit IDs as specified by the Bluetooth SIG. Services Services are simply defined as a cabinet which can hold many drawers in it, which in turn are called as characteristics. A service can have many characteristics. Each service is unique in itself with a universally unique identifier UUID that could either be 16 bit in size for official adapted services or bit for custom services.

Characteristics contain a single data point and akin to services, each characteristic has a unique ID or UUID that distinguishes itself from the other characteristic. For example HRM sensor data from health bands etc.

Linux offers the best support for BLE. In order to use BLE, we need to install the bluetooth stack blueZ. It can be installed by running. This device will work as the central gateway for communicating with other peripheral devices.

Before starting, we need to scan for BLE devices in our vicinity. For these purposes, the hcitool is indispensible. In order to find out the relevant services and characteristics, one may use a gatttool.

GATT stands for Generic Attribute and defines a data structure for organizing characteristics and attributes. We can discover, read, and write characteristics using gatttool. After obtaining the address of the BLE device we need to connect to it and this is when we use gatttool. In case of devices that only connect with phones and not to a computer, the above steps might not work. In order to connect with such devices, we need to use a random address.

After successful connection, we can see the services and characteristics of the device using the commands. We can also filter the displayed handles to a particular range using a command like char-desc 01 05 which displays 5 handles from 1 to 5. In order to write to a specific handle, we need to know which one is a write handle. For this, we can go for a hit and try method and try reading all the handles one by one until we encounter a read error. A read error means the specific handle is a write handle write handles cannot be read.

Alternatively, apps like such as nrf connect can automatically figure out the write handles.



0コメント

  • 1000 / 1000