Thursday, May 20, 2010

Underground - Bluetooth Hacking


Underground - Bluetooth Hacking
In this Underground Video, Strome explains several bluetooth attacks used against mobile phones. He demonstrates the Bluebug attack which exploits a security loophole on cell phones allowing the attacker to take full control of the device. The Bluebug attack enables an attacker to initiate calls, read & send SMS messages, read & edit the phone book, and change settings. Furthermore, Strome shows another popular bluetooth attack called Bluesnarfing a.k.a. the OBEX Push Attack. Bluesnarfing allows an attacker to extract, create, and delete files on the mobile device.

Note: These bluetooth attacks only work on a hand full of cell phones.


Image
Image


Image
Code:
http://hotfile.com/dl/14073744/c60a837/Underground201520-20Bluetooth20Hacking.avi.html

0 Responses to “Underground - Bluetooth Hacking”

Post a Comment