18
Bluetooth Bluetooth Presented by Presented by Venkateshwar R Gotur Venkateshwar R Gotur CMPT - 320 CMPT - 320

Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

  • Upload
    xia

  • View
    68

  • Download
    0

Embed Size (px)

DESCRIPTION

Bluetooth Presented by Venkateshwar R Gotur CMPT - 320. AGENDA. Bluetooth Overview Types of Bluetooth enabled devices and technology Benefits of Bluetooth Bluetooth Security, Vulnerabilities and Threads Security Recommendations, Needs and Requirements. Bluetooth Overview. - PowerPoint PPT Presentation

Citation preview

Page 1: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

BluetoothBluetooth

Presented byPresented by

Venkateshwar R GoturVenkateshwar R Gotur

CMPT - 320CMPT - 320

Page 2: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

AGENDAAGENDA

Bluetooth OverviewBluetooth Overview Types of Bluetooth enabled devices Types of Bluetooth enabled devices

and technologyand technology Benefits of BluetoothBenefits of Bluetooth Bluetooth Security, Vulnerabilities Bluetooth Security, Vulnerabilities

and Threadsand Threads Security Recommendations, Needs Security Recommendations, Needs

and Requirements.and Requirements.

Page 3: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Bluetooth OverviewBluetooth Overview

Bluetooth was founded in 1998 by: Bluetooth was founded in 1998 by: Ericsson, Intel, IBM, Toshiba and NokiaEricsson, Intel, IBM, Toshiba and Nokia

Created in order to promote, shape an Created in order to promote, shape an define the specification and position define the specification and position Bluetooth in the market placeBluetooth in the market place

It name comes form the 10It name comes form the 10thth century century Danish King Harald, who managed to unite Danish King Harald, who managed to unite Denmark and NorwayDenmark and Norway

Page 4: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Continued…Continued…

Bluetooth is a radio technology used for Bluetooth is a radio technology used for exchanging data over short distancesexchanging data over short distances

Bluetooth is a standard and Bluetooth is a standard and communication protocol primarily communication protocol primarily designed for low power consumption, with designed for low power consumption, with a short range based on low cost a short range based on low cost transceiver microchips in each device. transceiver microchips in each device.

Used within the devices like cell phones, Used within the devices like cell phones, laptops and other wireless devices to laptops and other wireless devices to communicate.communicate.

Page 5: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320
Page 6: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Bluetooth TechnologyBluetooth Technology

Short range (theoretically 10 –100m)Short range (theoretically 10 –100m) Point to point or point to multipointPoint to point or point to multipoint Wireless (ISM frequency band - 2.4GHz)Wireless (ISM frequency band - 2.4GHz) Voice and data transfer ( up to 1Mb/s)Voice and data transfer ( up to 1Mb/s)

Page 7: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Bluetooth Enabled DevicesBluetooth Enabled Devices

LaptopsLaptops HeadsetHeadset Printers Printers KeyboardsKeyboards GPSGPS Cellular Phones and many more….Cellular Phones and many more….

Page 8: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Benefits of BluetoothBenefits of Bluetooth

Cable replacement Cable replacement Ease of File sharingEase of File sharing Wireless SynchronizationWireless Synchronization Internet ConnectivityInternet Connectivity Share capabilitiesShare capabilities

Page 9: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Bluetooth Vulnerability, Security Bluetooth Vulnerability, Security and Threatsand Threats

BluesnarfingBluesnarfing BluejackingBluejacking BluebuggingBluebugging Car WhispererCar Whisperer Denial of ServiceDenial of Service Fizzing AttacksFizzing Attacks Pin CrackingPin Cracking BlooverBloover Blue smackBlue smack Long distance snarf, etcLong distance snarf, etc

Page 10: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

BluesnarfingBluesnarfing

Unauthorized access of information from a Unauthorized access of information from a wireless device.wireless device.

Loss of personal information.Loss of personal information. Can rout out calls to his/her cell phones.Can rout out calls to his/her cell phones. Works within the mechanism for Works within the mechanism for

exchanging business cards.exchanging business cards. OBEX (object exchange). OBEX (object exchange). Aims for discoverable and undiscoverable Aims for discoverable and undiscoverable

devices to be hacked based on brute devices to be hacked based on brute force.force.

Page 11: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Continued…Continued…

Page 12: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Blue jackingBlue jacking

Attacked by sending unsolicited Attacked by sending unsolicited messages to a user of Bluetooth messages to a user of Bluetooth enabled devices.enabled devices.

Blue jack can create a phone book Blue jack can create a phone book contact and write messages.contact and write messages.

Pop up messages from the hacker Pop up messages from the hacker User can panic that his/her device is User can panic that his/her device is

hacked.hacked.

Page 13: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Continued…Continued…

Page 14: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

BluebuggingBluebugging

Bluebugging goes well beyond Bluebugging goes well beyond bluesnurfing and bluejacking.bluesnurfing and bluejacking.

Allows hackers to completely takeover a Allows hackers to completely takeover a Bluetooth device.Bluetooth device.

Blue bug has capabilities like bluesnarfing.Blue bug has capabilities like bluesnarfing. Bluebugger can pick up conversations in Bluebugger can pick up conversations in

phone’s immediate area.phone’s immediate area. Bluebugger manipulates “backdoor” Bluebugger manipulates “backdoor”

attacks and many more etc….attacks and many more etc….

Page 15: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Continued…Continued…

Page 16: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Security recommendations, needs Security recommendations, needs and requirements.and requirements.

Disable Bluetooth, Turn off Bluetooth Disable Bluetooth, Turn off Bluetooth features when not in use.features when not in use.

Paring security: Bluetooth devices should Paring security: Bluetooth devices should be paired up in a private physical setting be paired up in a private physical setting to minimize the risk of potential attack.to minimize the risk of potential attack.

User should not respond to any messages User should not respond to any messages requesting for a pin.requesting for a pin.

Pin for Bluetooth devices should be Pin for Bluetooth devices should be changed on regular intervals with at least changed on regular intervals with at least eight characters alphanumeric.eight characters alphanumeric.

Always Upgrade your devices to the latest technology.

Page 17: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Continued…Continued…

Do not pair up with other devices if you Do not pair up with other devices if you feel its unsecure.feel its unsecure.

Higher layer of encryption will also add an Higher layer of encryption will also add an additional layer to security.additional layer to security.

With increase in Bluetooth enabled With increase in Bluetooth enabled devices the user should establish devices the user should establish connection only with trusted devices.connection only with trusted devices.

Spatial distance can avoid other devices to Spatial distance can avoid other devices to gain access to your Bluetooth enabled gain access to your Bluetooth enabled device.device.

Page 18: Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

QUESTIONSQUESTIONS