Underground - Bluetooth Hacking
Thursday, May 20, 2010Posted by
Admin
View Comments
Underground - Bluetooth Hacking
In this Underground Video, Strome explains several bluetooth attacks used against mobile phones. He demonstrates the Bluebug attack which exploits a security loophole on cell phones allowing the attacker to take full control of the device. The Bluebug attack enables an attacker to initiate calls, read & send SMS messages, read & edit the phone book, and change settings. Furthermore, Strome shows another popular bluetooth attack called Bluesnarfing a.k.a. the OBEX Push Attack. Bluesnarfing allows an attacker to extract, create, and delete files on the mobile device.
Note: These bluetooth attacks only work on a hand full of cell phones.
Code:
http://hotfile.com/dl/14073744/c60a837/Underground201520-20Bluetooth20Hacking.avi.html
Labels:
Hacking
Underground - Bluetooth Hacking
Underground - Bluetooth Hacking
In this Underground Video, Strome explains several bluetooth attacks used against mobile phones. He demonstrates the Bluebug attack which exploits a security loophole on cell phones allowing the attacker to take full control of the device. The Bluebug attack enables an attacker to initiate calls, read & send SMS messages, read & edit the phone book, and change settings. Furthermore, Strome shows another popular bluetooth attack called Bluesnarfing a.k.a. the OBEX Push Attack. Bluesnarfing allows an attacker to extract, create, and delete files on the mobile device.
Note: These bluetooth attacks only work on a hand full of cell phones.



In this Underground Video, Strome explains several bluetooth attacks used against mobile phones. He demonstrates the Bluebug attack which exploits a security loophole on cell phones allowing the attacker to take full control of the device. The Bluebug attack enables an attacker to initiate calls, read & send SMS messages, read & edit the phone book, and change settings. Furthermore, Strome shows another popular bluetooth attack called Bluesnarfing a.k.a. the OBEX Push Attack. Bluesnarfing allows an attacker to extract, create, and delete files on the mobile device.
Note: These bluetooth attacks only work on a hand full of cell phones.
Code:
http://hotfile.com/dl/14073744/c60a837/Underground201520-20Bluetooth20Hacking.avi.html