From the course: Ethical Hacking: Wireless Networks

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Legacy attacks using Bluesnarfer

Legacy attacks using Bluesnarfer - Linux Tutorial

From the course: Ethical Hacking: Wireless Networks

Start my 1-month free trial

Legacy attacks using Bluesnarfer

- [Instructor] One of the early tools for Bluetooth hacking is called Bluesnarfer. As with a number of the tools in the penetration testing kit, this has been overtaken by security improvements in mobile phone technology and isn't a viable attack these days. The original concept of Bluesnarfer was to pair silently with another device and then issue commands to gain access to stored information or to issue AT commands, which allow a remote attacker to send messages or dial numbers. While it's not a viable attack anymore, it's useful to go through the process to understand how it worked. Let's check our Bluetooth setup. Okay, I've got my Avantree adapter plugged in and ready to go. That's the Cambridge Silicon Radio Bluetooth dongle. And it's on hci0, as I'd expect. Let's also check what Bluetooth devices we can see with hcitool, and I can see my Acer mobile device. I'll ping it to make sure it's responding. In…

Contents