Shared Flashcard Set

Details

Bluetooth
Weaknesses & Attacks
25
Computer Science
Undergraduate 4
04/28/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Summarise the six security weaknesses of bluetooth?
Definition
Unit key
PIN
Location privacy - tracking devices
Denial of service attacks
Implementation attacks
Problems with cryptographic algorithms
Term
What protection is provided by the UNIT KEY from attacks from trusted devices
Definition
None
Term
How might a trusted device eavesdrop traffic?
Definition
a trusted device (a device that
possesses the unit key) that eavesdrops on the initial authentication messages
between two other units that utilize the unit key will be able to eavesdrop on any
traffic between these two units
Term
What are the three weaknesses associated with the pass-key or PIN
Definition
Fixed PIN
Weak PINs
Security keys are based upon the security PIN
Term
As a result of sec keys being based on security PIN an attack could do what?
Definition
Brute force possible PINs
Term
What are the three main issues related to location privacy?
Definition
Devices can be in discoverable mode
Every device has a fixed hardware address
These hardware addresses are sent in clear
Term
What actually is location privacy?
Definition
It is possible to track devices
Term
There are five types of location tracking attacks, what are they?
Definition
Inquiry attacks
Traffic monitoring attacks
Paging attack
Frequency hoping attack
User-friendly name attack
Term
So, despite the shit description in the notes - what is the massive fuck-up that makes the UNIT KEY such an issue?
Definition
unit that uses a unit key is only
able to use one key for all its secure connections. Hence, it has to share this key
with all other units that it trusts
Term
What can prevent location tracking?
Definition
To protect a device against location tracking, an anonymity mode is
needed. Devices operating in anonymous mode regularly update their device
address by randomly choosing a new one
Term
What's the BD_ADDR? What does it stand for? How long is it
Definition
a unique ID given to each BT device

It stands for Bluetooth Device Address

It is 48 bits long
Term
What is an inquiry attack?
Definition
Say you've scattered BT devices everywhere, you can track by constantly sending out inquiry messages and track the responses
Term
Why is an inquiry attack limited?
Definition
If a device is not in discoverable mode the attack will not work
Term
The limitations of an inquiry attack is that a device must be in discoverable, what other attack can you use but without this limitation?
Definition
traffic monitoring attack
Term
How does a traffic monitoring attack work?
Definition
attacker simply monitors the communication
between two trusted devices belonging to the victim. These devices will communicate
using a specific CAC. This CAC is computed from the device address of
the master device in the piconet. Therefore, an attacker can determine the master
devices in the area by simply monitoring all network traffic nearby
Term
What is a paging attack?
Definition
If you know the BD_ADDR then you page the target device and wait for the ID to be returned. If it is returned, then the device is present.
Term
What is a frequency hopping attack?
Definition
Use a repeating hopping sequence
Term
What is a 'user friendly name'?
Definition
There is a bluetooth command to request a user friendly name after a paging request
Term
What is a user friendly name attack?
Definition
Enquire whether the user-friendly name is there
Term
List the three implementation attacks
Definition
Bluejacking
Bluebugging
Bluesnarfing
Term
What is a bluesnarfing attack?
Definition
The attacker is able to set up a connection to an (unpaired) victim’s
device without alerting the victim or requiring the victim’s consent. After
doing this, the attacker is able to access restricted portions of the victim’s personal
data, such as the phone book, address book, and calendar.
Term
What is a bluejacking 'attack'?
Definition
Sending messages to the phone..
Term
Is bluejacking a real threat to security?
Definition
No. It's just annoying.
Term
What is bluebugging (AKA backdoor attack)
Definition
You set up a pairing, 'erase' the entry from the list of paired devices, but not really delete it from the link key's database.
Term
Why bother doing the bluebugging?
Definition
You can access the services etc of a trusted device but without a user knowing you can do it
Supporting users have an ad free experience!