Saturday, March 30, 2019

Types Of Bluetooth Hacking Computer Science Essay

Types Of Bluetooth Hacking Computer Science EssayBluetooth is a wireless technology which is used to exchange information over short range of distances by making use of short-wavelength radio transmissions. This technology is used in meandering(a) as well as fixed winds. It enables the connection of several devices at the same time.Given that the Bluetooth has been used for a long time, there follow several flaws in the system. These flaws have been subject to different types of attacks over time, unguarded to hacking. which makes the technology veryTypes of Bluetooth hackingBluejackingThe first most popular attack on Bluetooth enables devices is Bluejacking. This type of attack enables unknown sight to diffuse unwanted messages or electronic condescension fargons to Bluetooth enabled nomadic hollos. The assaulters modify the procedure for card passing so as to make the message to be send to appear as a business card and then send the business card to a nearby mobile pho ne which is Bluetooth enabled.Bluejacking tools argon very easy to use and these messages can be shooted in crowdy places for examples in shopping malls. Some people even use the bluejacking technique to send commercialised advertisement messages to people passing nearby.BluesnarfingThe Bluesnarfing attack is much to a greater extent damaging to the bluejacking technique as it enables you to wirelessly connect to to Bluetooth enables mobile phones without both fellowship from the owner and copy their the mobile phones address book, their sms messages, their cry (out) logs and some much advanced features enable you to to update the directory of the mobile by adding new contacts in the mobile phones.Most bluesnarfing tools are downloaded as JAR files.The Bluesanrfing technique plant exchangeable the Bluejacking technique by making use of the exchange of business cards. This exchange is done using the OBEX protocol and enables the Bluetooth machine to connect to the device which needs to be compromised but instead of exchanging a business card, it beseech for information (the phonebook file, the call logs etc) from the target.BluebuggingThe Bluebugging attack is more powerful than the bluejacking and bluesnarfing attacks. It allows the attacker to take complete control of your mobile phone without the user clear-sighted anything about it. They can make phone calls, listen to conversations where the phone is located. Bluesanrfing capabilities withal exist in bluebugging tools like copying the phone book and the the phones call list.What factors make the Bluetooth technology vulnerable?Previous Bluetooth enabled devices contined many flaws.Users use pins which are short in length and easy to find out.Users accepting matrimony blindly from unknows sources.Motivated hackers who want to gain valuable information.People going their Bluetooth permanently on.How to Bluejack1. scratch a busy place where lots of mobile phones might be, such as shopping centres , trains, bars or cinemas2. make water a new entry in your phones address book like Hi youve been bluejacked. Attach a picture if you want to.3. Search the nation for other Bluetooth phones to contact and choose one.4. Send your message. They then receive the message, Hi youve been bluejacked.5. Keep a look out for when your victim gets the message and the get look on their face.Comparison between Bluetooth Hacking ToolsToolSource turn onAvailabilityComplexity/Ease of UseFeaturesPurposeTypes of attack backwardnessSuper Bluetooth Hack 1.6 electric shock filing cabinetFreeMediumFind Bluetooth enabled devices.Copy Phone Book, Copy SMS messages.Copy Logs (Dialled, Received calls).Make calls . happen Mobile Information.For HackingBluesnarfing yoke askBloooverJar FileFree tardilyScan for Bluetooth enabled devices.Access logs.For proof of concept, educational, audit and testing purposes only.BluejackingPairing RequiredWorks only on old version of mobile phonesBlueshootJar fileFreeEas yScan for Bluetooth enabled devices.Shoot messages.For marketing/commercial puposesBluejackingPairing RequiredMagic Blue HackJar FileFreeMediumScan for Bluetooth enabled devices.Send MessagesRead Phone Book.For HackingBluesnarfingPairing RequiredINSERT INFO FOR TOOL ON LINUXCOMPLEXFor HackingBluesnarfing surety Tips to prevent attacks on mobile phonesEnable Passcode Lock on Your phoneThe most basic precaution you can take is to enable passcode interlace and set it to automatically engage after a brief pointedness of inactivity. By default, a passcode is not required to unlock the phone. Most people would put off this security measure for ease of use and convenience. However, the right is that once you have it enabled, it becomes second nature and you would not notice any difference. It is recommended that you set a strong passcode. In the event of a somatic theft, this allow increase the effort required to compromise your phone.Disable Features That Could Be Accessed Without En tering the PasscodeThis would prevent the use of applications from your phone without your knowledge.Disable geotagging on the phone.This leave behind prevent attackers find out where you are located.Erase All the data Before Return, Repair, or Resale of Your phone.Erase all confidential information so that attackers cannt retrieve your personal information.Regularly Update the phones Firmware or operate system.This will nebale you to get the latest security features for your mobile phones.Disable Bluetooth When not in UseDisabling Bluetooth when not in use will prevent attackers from getting access to you phone when not in use.

No comments:

Post a Comment