Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Bluetooth cracking tools released

Connections to PCs and mobile phones hijacked.

Article comments

German programmers have released two tools aimed at compromising Bluetooth devices, including PCs, at the Chaos Communications Congress in Berlin.

Enterprises generally ignore Bluetooth from a security point of view, but should be aware that there are fundamental security weaknesses in the wireless specification, according to Thierry Zoller, who introduced the tools at the conference on Friday.

Zoller, a security consultant, developed BTCrack, an implementation of a flaw disclosed in 2005 by Israeli security researchers. The tool takes advantage of weak PINs in Bluetooth devices, allowing an attacker to listen in on a pairing session and gain access to both paired devices.

HID Attack is a proof-of-concept exploit for hijacking a Bluetooth keyboard using the Human Interface Device (HID) standard. The attack could allow access to sensitive systems, according to developer Collin Mulliner, who said he came across the problem by accident while developing a software keyboard.

"The threat potential is high, it basically is like getting physical access to the target system," Mulliner said in a paper released in connection with Zoller's talk.

However, several practical obstacles mean that carrying out an attack is difficult, he acknowledged. Not all HID hosts implement server mode, which is necessary for the attack, and the fact that the screen might not be visible adds more complications.

And there's the main issue limiting all Bluetooth attacks - that they must be carried out at close range.

However, the BTCrack and HID Attack show that such attacks are far from theoretical, Zoller said in his talk.



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *