Attacking computers over Bluetooth

From: Chris Byrd (cbyrd01@gmail.com)
Date: Wed Aug 03 2005 - 11:14:37 EDT


I have been able to locate a lot of information about attacking
devices such as phones and PDAs via Bluetooth, including a lot of
great information at trifinite.org. What I am unable to determine is
the extent to which a computer can be compromised using the same
methods.

Does anyone on the list have experience pentesting Bluetooth enabled
computers? To what extent is a computer that has built in Bluetooth
or an add-in adapter at risk?

Thanks,

Chris

------------------------------------------------------------------------------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't

Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:

http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:40 EDT