Bluetooth Hacking-Full Disclosure presented at SyScan 2005

by Adam ( Major Malfunction ) Laurie,

Tags: Security Community

Summary : In November 2003, Adam Laurie discovered serious flaws in the authentication and data
transfer mechanisms on some Bluetooth enabled devices, and, in particular, mobile phones
including commonly used Nokia, Sony Ericsson and Motorola models. Shortly thereafter,
Martin Herfurt of Salzburg Research Forschungsgesellschaft mbH expanded on these problems,
and teamed up with Adam to investigate further. At EuroFoo in August 2004, Adam and Marcel
Holtmann met, and agreed to collaborate on looking into the underlying causes of the
problems, as well as sharing information and resources to try and gain a better foothold
for the Open Source community within the official Bluetooth organizations.This talk will cover the issues arising out of the flaws, as well as the actual stack
methodologies and tools used, and an update on the industry's response and progress since
the original discoveries.This will be a fun talk and a real eye-opener for those with Bluetooth enabled devices, and
will start with an introduction into the Bluetooth architecture and the security mechanisms
offered by it so that it is possible to understand how and why the different attacks are working.
Further there will be an introduction into the Linux Bluetooth stack BlueZ that will be used
for doing the attacks and showing exactly how these attacks are working.