Hacking of bluetooth devices

Introduction:

Blooover (also known as BloOover), a representative of Bluetooth Wireless Technology Hoover, a proof-verification system, Bloover is a second-generation version of a program that contains a variety of attacks, including Bluebug Blue Star, Helomoto, and Breeder is a compatible program. which distributes clients to Bloover il.

The purchased software package purchased included a program called Bloover II. As soon as the JSR-82 enabled phone is found the system is easily installed. As for running the program, it seemed to stay in one of the programs One of the software programs was suspended while the program was using “HeloMoto attack.

During Hacking Of Bluetooth Devices, the hacker tries to” plant “the log in the victim’s phone directory. What attacks we would like to use on the victim’s phone. When we create and attempt individual attacks on ourselves, the software would always stop.

HOW TO WORK? | Hacking Of Bluetooth Devices

The only performance that could be carried out was the first price analysis of the phone to get basic information on the phone showing a series of screenshots using Blooover II from the W550i phone to the W800i phone. shows the scanner’s phone scan on another Bluetooth phone, in, a device called W800i is available. 

The hardest part for the attacker is, in fact, finding a tool with an open Bluetooth connection or tricking someone into pairing their phone.

a series of screenshots of the attacker’s phone (W5501) associated with the target phone (W8001). When pairing has been successfully completed, BT Info displays a menu of possible actions.

The attacker can use the Calling option, for example, to make a second call to the victim to listen to the victim’s conversations. If the target phone has a speaker function that works when the phone is switch off, the attacker can still make a call and listen from the main action menu, the attacker can change the display language used by the phone.

Keys function is a BT Info feature that allows the attacker to view keys that the victim is pushing as they are push or that allows the attacker to press keys away from the victim’s phone. With the last operation, the attacker can access the phone’s target sticky keys identified by each keypad key.

The BT Info control function allows the attacker to remotely access the target control keys, including volume control, media player, and camera.

BT Info also gives the attacker access to targeted text message messages.

SMS Action

SMS action, for example, allows the attacker to select a mailbox on the victim’s phone and retrieve the full content of all SMS messages. Some of the other actions are simply informative, including phone temperature, which Bluetooth devices the device is trusted to the victim’s phone, what sound, if any, the phone does when the button is pressed,

The state of memory, and what action compels you to lock the key. Action Action has several options. Automatic Key Lock gives the attacker the ability to automatically lock the victim when it is unlock: That is, when the victim opens the phone, it will automatically unlock it. The random and time option and random change of time change the date and time of the abuse about 100 times per minute. Similarly, the Random Alarm option sets the alarm settings for the victim’s phone.

WHAT IS BLUETOOTH SPY?

Bluetooth Spy is a bluetooth device scanner take down in java (J2ME) It mainly detects bluetooth devices:

Basic Linux Bluetooth tools

Hciconfig :

This tool works like ifconfig on Linux, except that it works on Bluetooth devices. As you can see in the picture, I used it first to bring the Bluetooth interface (hci0) and secondly, to ask the device.

Hcitool :

This is a questioning tool. It can provide us with device name, device ID, device category, and device clock.

hcidump:

This tool enables us to smell Bluetooth connections.

Bluetooth Attacks | Hacking Of Bluetooth Devices

  • Blueprinting: The process of printing on foot.
  • Bluesnarfing: This attack takes data from a Bluetooth-enabled device. This may include SMS messages, calendar information, photos, phonebook, and chats.
  • Bluebugging: Attacker is able to control the target phone. Bloover was establish as a POC tool for this purpose.
  • Bluejacking: An attacker sends a “business card” (text message) which, if the user allows it to add to their contact list, enables the attacker to continue sending additional messages.
  • Bluesmack: DoS Attack on Bluetooth Devices.

Written By: Mayank Mevada

Reviewed By: Sayan Chatterjee

If you are Interested In Machine Learning You Can Check Machine Learning Internship Program
Also Check Other Technical And Non Technical Internship Programs

Leave a Comment

Your email address will not be published. Required fields are marked *