Bluetooth Can Be Cracked!

Nothing is completely safe today. Adobe has recently released a patch for a security hole in different graphical software, so why should Bluetooth be safe?

... and Bluetooth isn't safe off course! ;)

Two researchers of the Tel Aviv University School of Electrical Engineering Systems say they have discovered a technique for taking control of Bluetooth-enabled mobile phones. After you've established a connection with an other cell phone, the attacker can easily make calls with your phone. If there is a Bluetooth connection with a PC, the hacker can even transfer data between his Bluetooth device / cell phone and the hacked computer. Bluetooth can be very dangerous as you can see! Even when the handsets have security features switched on, your cell phone isn't save at all!

Avishai Wool, senior lecturer and Yaniv Shaked, graduate student and both researchers of the Tel Aviv University School of Electrical Engineering Systems have published recently a paper about three methods for forcing a repeat of the pairing process, "Cracking the Bluetooth PIN" ( http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/ ). In this paper, a passive attack is described, in which an attacker can find the PIN used during the pairing process. The eye-opening conclusion of these two researchers: "Our results show that using algebraic optimizations, the most common Bluetooth PIN can be cracked within less than 0.06-0.3 seconds. If two Bluetooth devices perform pairing in a hostile area, they are vulnerable to this attack."

A Belgian Master student is making a fresh attempt to keep a list with Bluetooth security links on http://student.vub.ac.be/~sijansse/2e%20lic/BT/welcome.html.

Ollie Whitehousen security researcher of @stake, a digital security consulting firm ( http://www.atstake.com ) has written in October 2003 a paper that "examines methods of assessing the security of Bluetooth devices in relation to the protocol's design and implementation flaws" ( http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf ).

In general, the most critical point is the 'pairing' - connection procedure of two Bluetooth devices. When a Bluetooth device asks you to re-enter the PIN number for re-pairing, once the two devices are re-connected, the hacker can now easily crack the PIN code.

Links:

- http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf

- http://student.vub.ac.be/~sijansse/2e%20lic/BT/

- http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/

For feedback on this article, please visit http://wallies.info/blog/item/145/index.html

Walter V. is a self-employed internet entrepreneur and founder-webmaster of several websites, including
wallies.info :: A snappy blog about snappy blue things :: blog | wiki | forum | links - http://wallies.info
mblo.gs :: A snappy moblog community - http://mblo.gs

In The News:


pen paper and inkwell


cat break through


How To Upgrade Your PC

Before you upgrade your PC hardware it's best to search... Read More

Cheap Ink Cartridge

A cheap ink cartridge is sometimes the only way that... Read More

Buying a Plasma or LCD TV FAQs

This article focuses on frequently asked questions by buyers of... Read More

DVD Recorders: Getting Started

IMO, these sd work 'like a VCR' as far as... Read More

Building A PC

Many people simply go to the retail store and get... Read More

Laptop Computers and the PVP Effect!

Roll over lumbering desktop computers, the limber laptop is here,... Read More

The Newest Thing in Lighting - LED Lighting and What It Can Do

The other day my son said to me, what else... Read More

Used Laptop Computer: Your Quick Purchase Inspection Guide ? Part 1

Used laptop computers are everywhere these days. How can you... Read More

Video Cards: Is AGP Dead?

If you've been looking to upgrade your computer video card... Read More

Coping with a Serious Data Loss from your Computer Hard Drive

Data loss is an expensive reality. It's a hard fact... Read More

What Can You Do With A Mac Mini?

If you have not seen the newest addition to the... Read More

A Review of Samsung Laser Toners

Samsung laser toner is just as popular as its Hewlett-Packard... Read More

HIPPA Goes Mobile and Wireless for Hospitals and First Responders

It appears we need to further streamline health care and... Read More

Wireless Networking, Part 2: Setup and Security

The first installment in this two-part series of Tech Tips... Read More

Used Laptop Computer: Your Quick Purchase Inspection Guide ? Part 2

Used laptop computers are everywhere these days. How can you... Read More

A Review of Refurbished HP Laptops

HP refurbished laptops can be found on their website hpshopping.com.... Read More

Introduction to Dedicated Servers

A dedicated server is a single computer on a web-hosting... Read More

How To Choose The Best Gaming Laptop

The gaming laptop is coming of age! It is steadily... Read More

Obsolete Is A Dirty Word (Intel Pentium 64 Bit Microchip)

Get ready everyone, home computers are about to set new... Read More

You Can Prevent Computer Slowdowns & Issues

Most people understand preventive maintenance like changing the oil in... Read More

Refurbished Laptops are the Real Deal!

Laptop computers have found usefulness as portable media devices.Even refurbished... Read More

How to Save Money With Cheap Computers

We all know that computers change more then any other... Read More

Printer Ink Cartridges - The History

You are working at your computer and trying to print... Read More

The Road Ahead

We live in an area that has begun to... Read More

The Printer Cartridge Wars: Generic or Remanufactured Cartridges Right for You?

OverviewAs "generic", "remanufactured", and "new compatible" inkjet printer cartridges and... Read More

Wireless Networking, Part 1: Capabilities and Hardware

Wireless Networking, Part 1: Capabilities and HardwareThese days it isn't... Read More

Dell Inspiron 600m Notebook Computer

After twelve years of owning desktop computers, I finally opted... Read More

Laptop and Notebook Theft Prevention

Laptops or Notebook computers are an expensive personal and business... Read More

How To Stop Junk Faxes From Wasting Your Paper and Toner

Junk faxes waste the resources of every business. It is... Read More

Rackmount Computer Keyboards

The other piece of vital equipment to accompany the rack... Read More

The Importance of Ergonomic Products

Interestingly, ergonomics though sounds to be a modern and trendy... Read More

RFID for Beginners

RFID technology is used frequently today and has been around... Read More

Emergency Response VSAT Internet Communications

As 2005 begins, there are a number of products on... Read More