From the course: Ethical Hacking: Wireless Networks

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Understanding Bluetooth

Understanding Bluetooth - Linux Tutorial

From the course: Ethical Hacking: Wireless Networks

Start my 1-month free trial

Understanding Bluetooth

- [Instructor] For a period around 2008, Bluetooth became a topic of keen interest to security researchers due to a weakness which enabled information to be silently sucked out of mobile phones across their Bluetooth channel. This has subsequently been fixed but interest continues in this form of close-end communication. The Bluetooth protocol works in the 2.4 gigahertz frequency which is also used by WiFi and ZigBee systems and is defined by the IEEE Standard 802.15.1. Bluetooth networks are known as Piconets and will often consist of just one master and one slave device. They can, however, be configured to have multiple slaves, up to seven although in this case, slaves can only talk to their master node, not to each other. A Bluetooth device is identified by its Bluetooth device address which is 48 bits or six bytes. It's normally presented as six two-digit hexadecimal pairs separated by colons. The top…

Contents