The video discusses the legacy attack using Bluesnarfer to extract phone records and call details from a mobile device via Bluetooth.
- [Instructor] One of the early tools for Bluetooth hacking…is called Blue Snarfer.…As with a number of the tools in the penetration testing kit…this has been overtaken by security improvements…in mobile phone technology, and isn't a viable attack…these days.…The original concept of Blue Snarfer was to pair silently…with another device, and then issue commands to gain access…to stored information or to issue AT commands, which allow…a remote attacker to send messages or dial numbers.…While it's not a viable attack anymore, it's useful…to go through the process to understand how it worked.…
Let's check our Bluetooth setup.…Okay, I've got my oven tree adapter plugged in…and ready to go.…That's the Cambridge Silicon Radio, Bluetooth Dongle.…And it's on hci zero as I'd expect.…Let's also check what Bluetooth devices we can see…with hcitool.…And I can see my Acer mobile device.…I'll ping it to make sure it's responding.…In order to config a kali to access the phone…I need to create and setup a temporary rc com directory…
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic WiFi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things