Upload
mbbritt0
View
224
Download
0
Embed Size (px)
Citation preview
8/2/2019 Bluetooth Wireless Threats
1/30
Michael Britt
8/2/2019 Bluetooth Wireless Threats
2/30
Wireless threats are all around in today'ssociety, wireless threats come in all shapesand sizes from someone attaching to yourWireless access point without authorization.
Wireless communication is broadcasted overradio waves, and it allows individuals toeavesdrop. Eavesdroppers listen to thewireless transmissions, and it is possible for
an eavesdropper to pick up confidentialinformation. (Inform IT, Wireless SecurityThreats)
8/2/2019 Bluetooth Wireless Threats
3/30
Wireless threats are becoming more popularwith the advancement of technology. Cellphones today can do a multitude of taskscompared to phones of earlier generations.
What individuals and corporations dontrealize is that they are at just as much of arisk for potential security threats on theirphones as they are at home or on their work
computers. Taking the necessary precautionscan protect confidential information.
8/2/2019 Bluetooth Wireless Threats
4/30
Bluetooth: What is it?Bluetooth is a wireless transmission standard
that facilitates the connection amongelectronic computing devices, in short range.
Bluetooth Transmission can be anywherebetween 1 meter or 100 meters.
Bluetooth Transmits data over a 2.4 GHz RadioFrequency. This frequency band has been set
aside by international agreement for the useof industrial, scientific and medical devices.(Technology in Action, Bluetooth)
8/2/2019 Bluetooth Wireless Threats
5/30
Bluetooth was founded in September of1998.(History of Bluetooth, Blue Tomorrow)
The name Bluetooth was given its name fromthe Danish king Harald Blaatand. The DanishKing was the one who fused Denmark andNorway between 940 and 985 AD. The DanishKing is known to bring together the telecomand computing industries in todays world.(History of Bluetooth, World Start)
8/2/2019 Bluetooth Wireless Threats
6/30
Malicious software did not impose threats onconsumers until 2004. The first event of thiswas when the Cabir Smart Phone wormattempted to spread amongst Symbian based
phones. June 14, 2004 was its intended dateto virtually destroy the Symbian basedphones. Cabir was the first network wormcapable of spreading through Bluetoothtechnology. (Worm.SymbOS.Cabir.a, VirusList)
8/2/2019 Bluetooth Wireless Threats
7/30
Bluetooth can be found on: Keyboards, Headsets, Printers, PDAs, Cell
Phones, Desktops, Wii, Playstation 3, andLaptops.
It is used to easily attach these portabledevices without the use of cables or wires.
With the use of Bluetooth users can simplywalk into a room and be connected without
wires, configuration changes, andtroubleshooting. (How Internet and PersonalSecurity Work, How Bluetooth Works)
8/2/2019 Bluetooth Wireless Threats
8/30
Bluetooth connections are wireless andautomatic. They require no configurations.This is called an Ad Hoc network, there is noserver or access point. The type of network
that Bluetooth uses is called a Peer to Peernetwork. (How Internet and Personal SecurityWork, How Bluetooth Works)
8/2/2019 Bluetooth Wireless Threats
9/30
Bluetooth has a microchip implanted in thecompatible device, the software is called a linkcontroller. The link controller is what seeks otherBluetooth devices.
After a Bluetooth device finds another device theycommunicate to see if they should connect withone another. They decide if they shouldcommunicate based on their Bluetooth profile.
Once the two devices decide if they should
connect they set up a connection which is calleda PICONET. (How Internet and Personal SecurityWork, How Bluetooth Works)
8/2/2019 Bluetooth Wireless Threats
10/30
Once the Bluetooth devices set up aconnection, it allows them to communicatewith one another simultaneously.
Bluetooth is used to send and receiveinformation from other wireless devices.
(How Internet and Personal Security Work, HowBluetooth Works)
8/2/2019 Bluetooth Wireless Threats
11/30
Bluetooth Can operate on Three SecurityModes:
1) Mode 1, which is non secure
2) Mode 2, which Provides Security at theservice level, after a channel is established.
3) Mode 3, which provides security at the linklevel, before the channel is established.
(Windows Security, Bluetooth Security Issues)
8/2/2019 Bluetooth Wireless Threats
12/30
Individuals and Corporations Owners of any Bluetooth devices
Example: Smart Phones, PDAs, Pocket PCs
(PenTest, Bluetooth Security Issues)
Many users set their phones on what hackers calldiscoverable mode in order to use Bluetoothdevices, but individuals almost always leave it inthat mode, when they are not even using there
Bluetooth device. "Fifty to seventy percent of thephones we see are vulnerable. (Tech world,Bluetooth Phones Easily Hackable)
8/2/2019 Bluetooth Wireless Threats
13/30
Theft of information, this could be personalinformation, or Corporate information.
Location based SPAM, which is based on yourphysical location. (Perimetec, Spam to mobile
devices based on your physical location) Bluetooth mobile phones can be hacked fairly
easy. If your mobile phone is hacked throughBluetooth it is letting someone steal phonebooks, images, calendar information, or anything
else that you may have stored on your Bluetoothenabled phone. (Bluetooth phones easily hackable, Techworld)
8/2/2019 Bluetooth Wireless Threats
14/30
BlueSnarf Bluejacking
BlueBug
Car Whispering Head Phone Hacking
8/2/2019 Bluetooth Wireless Threats
15/30
BlueSnarf was one of the first attacks usedwith Bluetooth. A hacker would have todownload this type of software, it is used tofind a flaw in Bluetooth access software.
The software will then begin to search forBluetooth devices operating in discoverymode. (How Personal and Internet SecurityWork, How Bluesnarfing Works)
BlueSnarf, is easy to use and is cheap toperform. (Technology in Action, PreventingBluetooth Attacks)
8/2/2019 Bluetooth Wireless Threats
16/30
BlueSnarf is an attack that uses OBEX which is acommunications protocol. OBEX allows theexchange of binary objects between devices.OBEX is a Push Profile. This form of an attack iseasy to use when the Bluetooth device is set invisible mode. BlueSnarf allows access to a phonebook of a connected cell phone withoutauthorization. When a potential hacker usesBlueSnarf they can steal any information that may
be stored. This attack also lets a hacker corruptany phone in range. (How Personal and InternetSecurity work, How Bluesnarfing Works)
8/2/2019 Bluetooth Wireless Threats
17/30
Bluejacking is done when a Bluetooth deviceexchanges at the beginning of its connection,it allows the hacker to take advantage of anyof the IDs that the devices exchange.
Bluejacking allows a hacker to steal aphonebook, calendar, or any data files.
BlueJackers make use of this ability mostly tosend offensive messages, or to disturbindividuals. (computer news me, Bluejacking)
8/2/2019 Bluetooth Wireless Threats
18/30
Bluebug is an attack that allows the hacker access tothe AT commands of a cellular phone. This form of anattack would allow the hacker to use the phonesservices without the owners knowledge.
A hacker could intercept incoming and out going
calls. Bluebugging is a Bluetooth security loophole on some
older cell phones, Newer phones are not affected.(Going around with Bluetooth in Full Safety, BlueBug)
BlueBug, is difficult, and much more expensive toexecute when compared to Bluesnarfing. (Technologyin Action, Preventing Bluetooth Attacks)
8/2/2019 Bluetooth Wireless Threats
19/30
Car Whispering is a relatively new phenomenon.Car Whispering is revealing vulnerabilities withrelatively new Cars that are Bluetooth compatible.With this a Hacker could be near by and could
use long range or even short range Bluetoothantennae, and hack into the Cars Bluetoothdevices. The use of Car whispering could be usedfor going after individuals or companies. The
attack could be used to distract the driver, andpossibly cause an accident. (Loose Wire Blog, CarWhispering)
8/2/2019 Bluetooth Wireless Threats
20/30
Head Phone Hacking, Bluetooth headsets canbe exploited through hacking. The hackerwould have the ability to record and injectaudio messages through the headset while
the device is not in an active call. BluetoothHackers make use of this Loop hole toeavesdrop, send offensive messages.(Computer News, Securing Bluetooth)
8/2/2019 Bluetooth Wireless Threats
21/30
In order to protect your self from BluetoothWireless Threats you should be careful whendownloading New programs or applications fromthe Internet, and make sure that it is a credibleweb site.
Make sure that your device functions properly,the way it was when it was purchased from thefactory.
Always deactivate the Bluetooth device when notin use.
Try to update the security software as soon aspossible. (Technology in Action, PreventingBluetooth Attacks)
8/2/2019 Bluetooth Wireless Threats
22/30
Bluetooth uses Man made electromagneticFrequencies. These frequencies are alsoknown as EMFs. (EMF Blues, Bluetooth EMFSafety)
When using wireless technology you areputting yourself in the presence of Microwaveradiation.
Long term Contact to Electromagnetic
Frequencies has been linked to Cancer, BrainTumors, ADD, Miscarriages, and even Hairloss. (EMF Blues, Bluetooth EMF Safety)
8/2/2019 Bluetooth Wireless Threats
23/30
EMF has been known to change and affectBiological changes in the human body. Thesebiological changes can be passed throughgenetics.
Bluetooth headsets expose the brain, ears,and even your eyes to EMFs. BluetoothHeadsets have been known to causeDeafness, Brain Tumors, and Headaches. (EMFBlues, Bluetooth EMF Safety)
8/2/2019 Bluetooth Wireless Threats
24/30
Bluetooth, has been going up compared to theslow economy. Bluetooth will continue to experience high
market growth, according to In-Stat/MDR. (GeekZone, Strong Growth for Bluetooth In Spite of the
Economy) The main challenge for Bluetooth is to educate its
users on the technology, instead of thetechnology behind Bluetooth.
Bluetooth is expected to grow from 10.4 million
to 510 million units from the year 2001 to 2006.this will be a 118% annual growth rate. (GeekZone, Strong Growth for Bluetooth In Spite of theEconomy)
8/2/2019 Bluetooth Wireless Threats
25/30
Many market analysts believe that BluetoothWill have a growing market through the year2007. this is believed due to the use ofBluetooth and mobile phones.
In-Stat predicts that Bluetooth will increaseits growth by 34% in 2007 which is adownturn from past years in the economy.(PC Authority, Bluetooth to Suffer Market SlowDown)
8/2/2019 Bluetooth Wireless Threats
26/30
A survey conducted by In-Stat shows that France,Germany, an the UK have the most individualsfamiliar with the use of Bluetooth, and Korea and
Japan had the lowest percentages, while the
United States was in the middle. (PC Authority,Bluetooth to Suffer Market Slow Down)
According to a Mobile Security Report of 2008,13.7% of those polled from Japan, United
Kingdom, and the United States were aware thatthey may have been a victim of an attack bymobile phone viruses.
8/2/2019 Bluetooth Wireless Threats
27/30
Mobile phone radiation is another issue thatis causing complaints from Bluetooth wirelessTechnology. In recent studies in the UnitedStates, results showed an increased risk of
Electro Magnetic Frequency. EMFs have beenrelated to Cancer, Brain Tumors,Miscarriages, Birth defects, alterations inDNA, and RNA.
8/2/2019 Bluetooth Wireless Threats
28/30
Bluetooth, May be headed for a massive re-invention that includes a possibility for newmarkets and applications to emerge in thenext two years in Asia, and even around the
world. Bluetooth inventors one day soonbelieve that a new version will be able tomonitor blood pressure or glucose levels, andhave tremendous amounts of help in the
Medical World. (Tele com asia, A New Age ForBluetooth)
8/2/2019 Bluetooth Wireless Threats
29/30
Wireless threats will continue to grow, withthe growth of technology. With the growingrate of Smart Phones and PDAs more andmore threats will develop. As more and more
phones use the WIFI networks there is goingto be more and more information out there.With more information hackers are going tocontinue to steal confidential information. Inorder to prevent wireless threats individualsneed to take the necessary precautions tomake sure that they are protected.
8/2/2019 Bluetooth Wireless Threats
30/30
Evans, Alan. Technology in Action. 5th ed. Upper Saddle River: Pearson, 2009.
"History of Bluetooth - WorldStart Computer Tips and Computer Help." WorldStart.com - The Best Computer Tips andSoftware Deals on the Internet! 05 Apr. 2009 .
"Bluetooth History." Bluetooth Technology - Home. 05 Apr. 2009.
"Viruslist.com - Worm.SymbOS.Cabir.a." Viruslist.com - Information About Viruses, Hackers and Spam. 05 Apr. 2009.
Gralla, Preston. How Personal and Internet Security Work. Indianapolis: Que, 2006.
"Bluetooth: Is it a Security Threat?" Network Security Articles for Windows Server 2003, 2008 & Vista. 05 Apr. 2009.
"Techworld.com - Bluetooth phones easily hackable." Techworld.com - Techworld IT infrastructure and networks. 05 Apr.2009 .
"Securing Bluetooth | Technology |." Computer News Middle East: Enterprise Resource for CIOs. 05 Apr. 2009.
"The Next Kind of Bluetooth Threat: Car Whispering." Loose wire blog. 05 Apr. 2009.
"Bluetooth EMF Safety." Welcome to EMF Blues! 05 Apr. 2009 .
"InformIT: Wireless Security Wireless Threats." InformIT: The Trusted Technology Learning Source. 05 Apr. 2009.
Welcome to Pentest Limited. 05 Apr. 2009 .
"The future: spam to mobile devices based on your physical location | Perimetec." AntiSpam Filter & Anti Spam FilteringServices | Perimetec. 05 Apr. 2009 .
"Strong growth for Bluetooth chipsets in spite of economy." Geekzone: technology news, blogs, forums. 05 Apr. 2009.
"Bluetooth to suffer market slowdown - News - PC Authority." PC Authority - Tech reviews, advice, news, downloads and forums. 05 Apr. 2009.
"A new age for Bluetooth." Telecomasia.net. 05 Apr. 2009 .