Friday, April 3, 2009

BLUETOOTH HACKING

Bluetooth is wireless technology of data and voice. It requires very low power .It has range from 10m-100m.It can transfer upto 1Mb/s of data.

What is blue-tooth hacking ?
Blue-tooth hacking is hacking the other device without the knowing that device.It is also know as Bluesnarfing. Blue-tooth hacking not only limited to cell phones ,but it can also hacked the desktop computers ,LAP’s .

bluetooth logo

Types of hacking-
Their are types of blue-tooth hacking –
1.Bluesnarfing
2.Bluejacking
3.Bluebugging

Bluesnarfing is same as Bluetooth hacking. While Bluesnarfing is very much different from bluejacking.Bluesnarfing first introduced by Marcel Holtmann in October 2003. Example is transfer of images.

Bluejacking is harmless technology ,the personal information not exposed .In this name field is used to transfer the data.The example for is transfer of business card. Bluebugging was introduced by Martin Herfurt in March 2004.
Example of bluebugging is transfer of messages.

Problems faced by user
1.The hacker can delete or steal the contacts ,personal images etc.
2.The hacker can make the call orelse use internet at your expenses.
3.The hacker can default to factory setting to your device.
4.The hacker can clone your device so that your messages are also routed to another number. Cloning is also considered as illegal.

Method of hacking
The general method is guessing media access control or MAC address which is at application level that has 48-bit number and is unique among mobile devices .
Some of them are made for Unix platform while others can be used on Java or Symbian compatible cell phone.

As hacking is illegal then Blue-tooth hacking and Bluesnarfing are also illlegal . This arcticle is aware of Blue-tooth technology to the user.

No comments:

Post a Comment

Blog Widget by LinkWithin