190 likes | 404 Views
Bluetooth Presented by Venkateshwar R Gotur CMPT - 320. AGENDA. Bluetooth Overview Types of Bluetooth enabled devices and technology Benefits of Bluetooth Bluetooth Security, Vulnerabilities and Threads Security Recommendations, Needs and Requirements. Bluetooth Overview.
E N D
AGENDA • Bluetooth Overview • Types of Bluetooth enabled devices and technology • Benefits of Bluetooth • Bluetooth Security, Vulnerabilities and Threads • Security Recommendations, Needs and Requirements.
Bluetooth Overview • Bluetooth was founded in 1998 by: Ericsson, Intel, IBM, Toshiba and Nokia • Created in order to promote, shape an define the specification and position Bluetooth in the market place • It name comes form the 10th century Danish King Harald, who managed to unite Denmark and Norway
Continued… • Bluetooth is a radio technology used for exchanging data over short distances • Bluetooth is a standard and communication protocol primarily designed for low power consumption, with a short range based on low cost transceiver microchips in each device. • Used within the devices like cell phones, laptops and other wireless devices to communicate.
Bluetooth Technology • Short range (theoretically 10 –100m) • Point to point or point to multipoint • Wireless (ISM frequency band - 2.4GHz) • Voice and data transfer ( up to 1Mb/s)
Bluetooth Enabled Devices • Laptops • Headset • Printers • Keyboards • GPS • Cellular Phones and many more….
Benefits of Bluetooth • Cable replacement • Ease of File sharing • Wireless Synchronization • Internet Connectivity • Share capabilities
Bluetooth Vulnerability, Security and Threats • Bluesnarfing • Bluejacking • Bluebugging • Car Whisperer • Denial of Service • Fizzing Attacks • Pin Cracking • Bloover • Blue smack • Long distance snarf, etc
Bluesnarfing • Unauthorized access of information from a wireless device. • Loss of personal information. • Can rout out calls to his/her cell phones. • Works within the mechanism for exchanging business cards. • OBEX (object exchange). • Aims for discoverable and undiscoverable devices to be hacked based on brute force.
Blue jacking • Attacked by sending unsolicited messages to a user of Bluetooth enabled devices. • Blue jack can create a phone book contact and write messages. • Pop up messages from the hacker • User can panic that his/her device is hacked.
Bluebugging • Bluebugging goes well beyond bluesnurfing and bluejacking. • Allows hackers to completely takeover a Bluetooth device. • Blue bug has capabilities like bluesnarfing. • Bluebugger can pick up conversations in phone’s immediate area. • Bluebugger manipulates “backdoor” attacks and many more etc….
Security recommendations, needs and requirements. • Disable Bluetooth, Turn off Bluetooth features when not in use. • Paring security: Bluetooth devices should be paired up in a private physical setting to minimize the risk of potential attack. • User should not respond to any messages requesting for a pin. • Pin for Bluetooth devices should be changed on regular intervals with at least eight characters alphanumeric. • Always Upgrade your devices to the latest technology.
Continued… • Do not pair up with other devices if you feel its unsecure. • Higher layer of encryption will also add an additional layer to security. • With increase in Bluetooth enabled devices the user should establish connection only with trusted devices. • Spatial distance can avoid other devices to gain access to your Bluetooth enabled device.