Hacking Bluetooth: Getting Started | Search for a title, author or keyword | ||||||||
Hacking Bluetooth: Getting Started This section of Hackers-Arise is dedicated to hacking the Bluetooth protocol. Bluetooth is the pico-net that extends at least 10m around our devices and enables us to connect headsets, speakers and other devices to our mobile devices. If one can hack the Bluetooth protocol, you can potentially steal sensitive information and contacts, intercept phone messages, send unwanted messages, etc. When two Bluetooth devices connect, this is referred to as pairing. Nearly any two Bluetooth devices can connect to each other. Any discoverable Bluetooth device transmits the following information:
When the two devices pair, they exchange a pre-shared secret or link key. Each stores this link key to identify the other in future pairing. Every device has a unique 48-bit identifier (a MAC-like address) and usually a manufacturer assigned name.
|
|||||||||
Hacking Bluetooth: Getting Started | Disclaimer: this link points to content provided by other sites. |