Term
| Summarise the six security weaknesses of bluetooth? |
|
Definition
Unit key PIN Location privacy - tracking devices Denial of service attacks Implementation attacks Problems with cryptographic algorithms |
|
|
Term
| What protection is provided by the UNIT KEY from attacks from trusted devices |
|
Definition
|
|
Term
| How might a trusted device eavesdrop traffic? |
|
Definition
a trusted device (a device that possesses the unit key) that eavesdrops on the initial authentication messages between two other units that utilize the unit key will be able to eavesdrop on any traffic between these two units |
|
|
Term
| What are the three weaknesses associated with the pass-key or PIN |
|
Definition
Fixed PIN Weak PINs Security keys are based upon the security PIN |
|
|
Term
| As a result of sec keys being based on security PIN an attack could do what? |
|
Definition
| Brute force possible PINs |
|
|
Term
| What are the three main issues related to location privacy? |
|
Definition
Devices can be in discoverable mode Every device has a fixed hardware address These hardware addresses are sent in clear |
|
|
Term
| What actually is location privacy? |
|
Definition
| It is possible to track devices |
|
|
Term
| There are five types of location tracking attacks, what are they? |
|
Definition
Inquiry attacks Traffic monitoring attacks Paging attack Frequency hoping attack User-friendly name attack |
|
|
Term
| So, despite the shit description in the notes - what is the massive fuck-up that makes the UNIT KEY such an issue? |
|
Definition
unit that uses a unit key is only able to use one key for all its secure connections. Hence, it has to share this key with all other units that it trusts |
|
|
Term
| What can prevent location tracking? |
|
Definition
To protect a device against location tracking, an anonymity mode is needed. Devices operating in anonymous mode regularly update their device address by randomly choosing a new one |
|
|
Term
| What's the BD_ADDR? What does it stand for? How long is it |
|
Definition
a unique ID given to each BT device
It stands for Bluetooth Device Address
It is 48 bits long |
|
|
Term
| What is an inquiry attack? |
|
Definition
| Say you've scattered BT devices everywhere, you can track by constantly sending out inquiry messages and track the responses |
|
|
Term
| Why is an inquiry attack limited? |
|
Definition
| If a device is not in discoverable mode the attack will not work |
|
|
Term
| The limitations of an inquiry attack is that a device must be in discoverable, what other attack can you use but without this limitation? |
|
Definition
| traffic monitoring attack |
|
|
Term
| How does a traffic monitoring attack work? |
|
Definition
attacker simply monitors the communication between two trusted devices belonging to the victim. These devices will communicate using a specific CAC. This CAC is computed from the device address of the master device in the piconet. Therefore, an attacker can determine the master devices in the area by simply monitoring all network traffic nearby |
|
|
Term
|
Definition
| If you know the BD_ADDR then you page the target device and wait for the ID to be returned. If it is returned, then the device is present. |
|
|
Term
| What is a frequency hopping attack? |
|
Definition
| Use a repeating hopping sequence |
|
|
Term
| What is a 'user friendly name'? |
|
Definition
| There is a bluetooth command to request a user friendly name after a paging request |
|
|
Term
| What is a user friendly name attack? |
|
Definition
| Enquire whether the user-friendly name is there |
|
|
Term
| List the three implementation attacks |
|
Definition
Bluejacking Bluebugging Bluesnarfing |
|
|
Term
| What is a bluesnarfing attack? |
|
Definition
The attacker is able to set up a connection to an (unpaired) victim’s device without alerting the victim or requiring the victim’s consent. After doing this, the attacker is able to access restricted portions of the victim’s personal data, such as the phone book, address book, and calendar. |
|
|
Term
| What is a bluejacking 'attack'? |
|
Definition
| Sending messages to the phone.. |
|
|
Term
| Is bluejacking a real threat to security? |
|
Definition
|
|
Term
| What is bluebugging (AKA backdoor attack) |
|
Definition
| You set up a pairing, 'erase' the entry from the list of paired devices, but not really delete it from the link key's database. |
|
|
Term
| Why bother doing the bluebugging? |
|
Definition
| You can access the services etc of a trusted device but without a user knowing you can do it |
|
|