Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1323276.1323281guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

BlueSniff: Eve meets Alice and Bluetooth

Published: 06 August 2007 Publication History

Abstract

Much of Bluetooth's data remains confidential in practice due to the difficulty of eavesdropping it. We present mechanisms for doing so, therefore eliminating the data confidentiality properties of the protocol. As an additional security measure, devices often operate in "undiscoverable mode" in order to hide their identity and provide access control. We show how the full MAC address of such master devices can be obtained, therefore bypassing the access control of this feature. Our work results in the first open-source Bluetooth sniffer.

References

[1]
{1} Bluetooth specification v1.2. http: //download.www.techstreet.com/ cgi-bin/pdf/free/298250/BT_Core_ vl_2%.pdf.
[2]
{2} GNU Radio-the gnu software radio. http:// www.gnuradio.org.
[3]
{3} Obex v1.3 specification. http://irda. affiniscape.com/associations/2494/ files/Specifications/OBEX%13_Plus_ Errata.zip.
[4]
{4} USRP--Universal Software Radio Peripheral. http://www.ettus.com.
[5]
{5} F-Secure. Security advice. http: //www.f-secure.com/f-secure/ pressroom/protected/prot-2-2006/ 17-407%-3032.shtml.
[6]
{6} K. Finisterre. http://www. digitalmunition.com/HijackHeadSet. txt.
[7]
{7} Frontline Technology. FTS4BT Bluetooth Protocol Analyzer & Packet Sniffer. http://www.fte. com.
[8]
{8} M. Holtmann. Bccmd, part of bluez - the linux bluetooth stack. http://www.bluez.org.
[9]
{9} M. Holtmann. BlueSnarf. http: //trifinite.org/trifinite_stuff_ bluesnarf.html.
[10]
{10} IEEE. Organizationally Unique Identifier. http://standards.ieee.org/regauth/ oui/oui.txt.
[11]
{11} M. Jakobsson and S. Wetzel. Security weaknesses in bluetooth. CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology.
[12]
{12} A. Laurie and M. Herfurt. BlueBug. http://trifinite.org/trifinite_ stuff_bluebug.html.
[13]
{13} M. Moser. Busting The Bluetooth Myth-- Getting RAW Access. 2007. http: //packetstormsecurity.org/papers/ wireless/busting_bluetooth_myth.p% df.
[14]
{14} Y. Shaked and A. Wool. Cracking the bluetooth pin. In the proceedings of the 3rd USENIX/ACM Conf. Mobile Systems, Applications, and Services (MobiSys), 2005.
[15]
{15} D. Spill. BlueSniff. http://www. cs.ucl.ac.uk/staff/a.bittau/ gr-bluetooth.tar.gz.
[16]
{16} J. Su, K. K. W. Chan, A. G. Miklas, K. Po, A. Akhavan, S. Saroiu, E. de Lara, and A. Goel. A preliminary investigation of worm infections in a bluetooth environment. In the proceedings of the 4th ACM workshop on Recurring malcode.
[17]
{17} Trifinite group. Trifinite. http://trifinite. org/trifinite_stuff.html.
[18]
{18} J. Wright. Bnap Bnap. http://802. 15ninja.net/bnapbnap/.

Cited By

View all
  • (2022)When Good Becomes EvilProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3559372(3181-3194)Online publication date: 7-Nov-2022
  • (2019)InternalBlue - Bluetooth Binary Patching and Experimentation FrameworkProceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services10.1145/3307334.3326089(79-90)Online publication date: 12-Jun-2019
  • (2019)Boosting the Bitrate of Cross-Technology Communication on Commodity IoT DevicesIEEE/ACM Transactions on Networking10.1109/TNET.2019.291398027:3(1069-1083)Online publication date: 1-Jun-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
WOOT '07: Proceedings of the first USENIX workshop on Offensive Technologies
August 2007
78 pages

Sponsors

  • USENIX Assoc: USENIX Assoc

Publisher

USENIX Association

United States

Publication History

Published: 06 August 2007

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)When Good Becomes EvilProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3559372(3181-3194)Online publication date: 7-Nov-2022
  • (2019)InternalBlue - Bluetooth Binary Patching and Experimentation FrameworkProceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services10.1145/3307334.3326089(79-90)Online publication date: 12-Jun-2019
  • (2019)Boosting the Bitrate of Cross-Technology Communication on Commodity IoT DevicesIEEE/ACM Transactions on Networking10.1109/TNET.2019.291398027:3(1069-1083)Online publication date: 1-Jun-2019
  • (2019)A Practical Bluetooth Traffic Sniffing SystemIEEE/ACM Transactions on Networking10.1109/TNET.2018.288097027:1(71-84)Online publication date: 1-Feb-2019
  • (2017)BlueBeeProceedings of the 15th ACM Conference on Embedded Network Sensor Systems10.1145/3131672.3131678(1-13)Online publication date: 6-Nov-2017
  • (2017)Revisiting Urban War NibblingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.267846312:7(1625-1636)Online publication date: 1-Jul-2017
  • (2016)Exploitation of Dual Channel Transmissions to Increase Security and Reliability in Classic Bluetooth PiconetsProceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks10.1145/2988272.2988275(55-60)Online publication date: 13-Nov-2016
  • (2016)Practical Bluetooth Traffic SniffingProceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services10.1145/2906388.2906403(333-345)Online publication date: 20-Jun-2016
  • (2016)Friend or Foe?Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security10.1145/2897845.2897847(189-200)Online publication date: 30-May-2016
  • (2012)How privacy leaks from bluetooth mouse?Proceedings of the 2012 ACM conference on Computer and communications security10.1145/2382196.2382309(1013-1015)Online publication date: 16-Oct-2012
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media