Bluetooth War Driving

  • geschlossen

Diese Seite verwendet Cookies. Durch die Nutzung unserer Seite erklären Sie sich damit einverstanden, dass wir Cookies setzen. Weitere Informationen

  • Bluetooth War Driving

    hallo,

    Ich denke das inzwischen JEDER weiss wie Aircrack und Co funzen. usw......

    doch hat jemand ne Ahnung wie das bei Bluetooth läuft.
    es ist ja möglich mit Software wie bei Aircrack, auch bluetooth Geräte zu entschlüsseln.

    frage mich wie sowas funktionieren soll?????

    Beim WLAN ist es logisch, man fängt die Pakete ab und entschlüsselt diese via bruteforce technik.

    doch beim bluetooth schwirren ja die päkchen nicht einfachso in der Luft herum!?! und paketinjektion ist ja nicht möglich!?! oder doch???

    hat jemand ne Ahnun WIE das so mit bluetooth ist oder funzt???

    :confused: :read: :confused:

    WLAN kann jeder, doch bluetooth ist schwierig
  • Das bring Googel: visukom.net/fileadmin/download…tooth%20Hacking%201.2.PDF

    oder das hier:
    Frontline Bluetooth Sniffer


    Bluetooth Security seems to be very good compared to 802.11 problems. But most of the Bluetooth Security is based the PIN you have to enter during pairing two devices or on the link key, which is a result of it. In addition Bluetooth uses much more channels and hops frequently within the spectrum, which makes Analyzing a real pain. Sniffing raw communication without being paired is until now only available to rich companies or individuals which could buy one of the over-priced Bluetooth Sniffers. When i say High-Priced i talk about

    10'000 US$.



    Frontline is one of the few Bluetooth Sniffer manufacturers and they sell their application together with a "special" Bluetooth sniffer ComProbe / dongle. Here are some marketing highlights from their FTS4BT product website:



    - Supports EDR (Enhanced Data Rate): FTS4BT is the only analyzer currently on the market to support Bluetooth v2.0 + EDR.

    - Finger-sized Bluetooth ComProbe: Air sniffing hardware is incredibly portable and requires no power.

    - Synchronized air and HCI sniffing: FTS4BT provides multiple points of observation, speeding up debug time.

    - Real-time debugging: FTS4BT captures, decodes, filters and displays data, and detects protocol errors simultaneously, all live and in real-time.

    - Decodes all Bluetooth protocols and most profiles.

    Quick release of new profiles to keep pace with changing Bluetooth specifications.

    - Extract Audio into WAV files for playback and analysis.

    - Includes Framedecoder for rapid development and seamless integration of HCI Vendor Extensions and other custom protocol implementations.

    - This Frontline technology is how we meet Bluetooth challenges.



    Current:

    It is in fact very easy to modify a very cheap standard USB dongle to be usable as comprobe and together with the nifty keygenerator, everyone can analyze Bluetooth. Follow the instructions below to get your Bluetooth raw sniffer for a few bugs. So for the marketing: This piece of reversing is how we meet the Frontline challenges