In this video, learn about the legacy attack using Bluesnarfer to extract phone records and call details from a mobile device via Bluetooth.
- [Instructor] One of the early tools … for Bluetooth hacking is called Bluesnarfer. … As with a number of the tools … in the penetration testing kit, … this has been overtaken by security improvements … in mobile phone technology … and isn't a viable attack these days. … The original concept of Bluesnarfer … was to pair silently with another device … and then issue commands to gain access … to stored information or to issue AT commands, … which allow a remote attacker to send messages … or dial numbers. … While it's not a viable attack anymore, … it's useful to go through the process … to understand how it worked. … Let's check our Bluetooth setup. … Okay, I've got my Avantree adapter plugged in … and ready to go. … That's the Cambridge Silicon Radio Bluetooth dongle. … And it's on hci0, as I'd expect. … Let's also check what Bluetooth devices we can see … with hcitool, and I can see my Acer mobile device. … I'll ping it to make sure it's responding. … In order to configure kali to access the phone, …
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic Wi-Fi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things