Chapter 13 Bluetooth
BlueSmacking
A Bluetooth denial-of-service attack.
BluetoothView
A small utility that lists discoverable Bluetooth devices with information such as the device name, Bluetooth address, major device type, and minor device type.
Bluesnarfing
An attack that uses the OBEX protocol to gain access to a Bluetooth device.
BTScanner
A Bluetooth sniffing tool that provides the same functions as BluetoothView.
Btlejuice
A complete framework to perform man-in-the-middle attacks on Bluetooth smart devices.
Super Bluetooth Hack
An Android phone application that can be used to view the files on another Bluetooth-connected Android phone.
Bluetooth MAC spoofing
An attack characterized by changing the device address of a Bluetooth device to match the address of a target device.
Bluejacking
An attack characterized by sending unwanted data to Bluetooth devices.
Bluebugging
An attack that exploits a Bluetooth device to install a backdoor that bypasses normal authentication, giving full access to the device.
Bluediving
A Bluetooth penetration suite used to implement BlueBug, BlueSnarf, and BlueSmack attacks as well as Bluetooth address spoofing.
Bluesniffing
The use of the Bluesniff wardriving utility to discover Bluetooth devices.
BluePrinting
The act of gathering details about a Bluetooth device that indicates its manufacturer and model.