Re: Bluetooth Pentesting?

From: Thor (Hammer of God) (thor@hammerofgod.com)
Date: Tue Aug 22 2006 - 13:31:41 EDT


I think you may be referring to "The Car Whisperer" here:

http://trifinite.org/trifinite_stuff_carwhisperer.html

t

On 8/21/06 5:48 PM, "Robert D. Holtz" <robert.d.holtz@gmail.com> spoketh to
all:

> Here's an interesting article on Blue tooth security:
>
> http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group15/index.html
>
> There was also a story circulating awhile back about the ability to transmit
> radio directly into someone's car stereo with a directional antenna. I'm
> sorry that I can't recall the details but I found it amusing that you can
> mess with someone by having whatever you want coming out their radio ... not
> truly a "real" security issue but amusing none the less.
>
> -----Original Message-----
> From: steven@lovebug.org [mailto:steven@lovebug.org]
> Sent: Monday, August 21, 2006 3:06 PM
> To: pen-test@securityfocus.com
> Subject: Bluetooth Pentesting?
>
> Greetings,
>
> Does anyone on this list do bluetooth pentesting? I have read tons of old
> posts and found plenty of tools to do a few different things. However, I
> do not find any of it to be overly useful. Most of the tools out there
> seem to be aimed at certain cell phones or are very specific. I am trying
> to find out what the risks are of all kinds of devices. I have found
> btscanner to be pretty good at detecting devices but it doesn't do too
> much other than detect it. I can scan and pickup 150+ devices and the
> Vulnerable to: section is always the same.. blank. Are all the bluetooth
> devices I find so super secure? I pick up cars, phones, PDAs, computers,
> keyboards, etc. Are there really no risks with these devices?
>
> Is there a better/good tool out there that can really find various
> bluetooth devices and tell me what -real- risks might be associated with
> them -- on top of that.. is there a good tool for trying to pull data or
> use these devices? Example: a dell or mac laptop has bluetooth on, or a
> Treo with it on.. what are the possible risks? What tools can actually
> test if authentication is required for connecting with these devices.. or
> whether I can bruteforce it or connect at all?
>
> Any suggestions would be greatly appreciate and I am really trying to do
> something more than just "detect" bluetooth devices. I need to know if
> there are risks here.
>
> Thanks
>
>
> ------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Need to secure your web apps?
> Cenzic Hailstorm finds vulnerabilities fast.
> Click the link to buy it, try it or download Hailstorm for FREE.
> http://www.cenzic.com/products_services/download_hailstorm.php
> ------------------------------------------------------------------------
>
>
> ------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Need to secure your web apps?
> Cenzic Hailstorm finds vulnerabilities fast.
> Click the link to buy it, try it or download Hailstorm for FREE.
> http://www.cenzic.com/products_services/download_hailstorm.php
> ------------------------------------------------------------------------
>
>
>

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:47 EDT