Jump to content

Bluetooth Sniper Rifle


joka

Recommended Posts

>unsuitable link deleted<

With some basic skills and a couple hundred bucks, you can build your own Bluetooth rifle, just like the guys at Flexilis. However, at this point, you are probably asking yourself, "Where do I get the software and how do I configure it?" In Part 2 of this article, we will explore how to install various open-source and never-before-released Bluetooth sniffing and attack tools on the Gumstix computer.

We will also interview the Flexilis staff on what their custom software is capable of doing. As John Hering says, "Our goal is to make the public more aware of wireless security issues and bad policies. Bluetooth is wide open and most people have no idea what can be done to their devices."

Has range of up to one mile.

Edited by cdnvic
Link to comment
Share on other sites

Great, more idiots that gain some publicity by trying to "educate" people about security flaws. If thats what they really cared about they'd find a defense for the problem before they let every script kiddy in on the secret of how to mess with people's property.

Wonder what these clowns would think if I compromised their vehicles to demonstrate the vulnerabilities of windows, tires, or electrical systems and "educate" the public about them? They'd be in tears at the police inquiries desk.

cv

Link to comment
Share on other sites

>unsuitable link deleted<

Aw come on...I wouldn't build one, honest. I love working in a post office. My co-workers are kind caring people. I don't need a social life. I don't mind going without sleep. My nerves aren't frayed at all...

:o

Actually I was dissapointed when I looked it up. A high-tech toy for pinching the phone numbers of chicks that won't give them to you anyway, how useful. I had something with a bit more firepower in mind...

Edited by Crushdepth
Link to comment
Share on other sites

it was just a warning, most people think that bluetooth is safe from a distance, but this shows it is not. for instance, using a bluetooth dongle on your internet connection.

for every tool, there is an anti-tool.

Edited by joka
Link to comment
Share on other sites

From Wired : http://www.wired.com/news/privacy/0,1848,64463,00.html

Serious flaws discovered in Bluetooth technology

used in mobile phones can let an attacker remotely download contact information from victims' address books, read their calendar appointments or peruse text messages on their phones to conduct corporate espionage.

An attacker could even plant phony text messages in a phone's memory, or turn the phone sitting in a victim's pocket or on a restaurant table top into a listening device to pick up private conversations in the phone's vicinity. Most types of attacks could be conducted without leaving a trace

Security professionals Adam Laurie and Martin Herfurt demonstrated the attacks last week at the Black Hat and DefCon security and hacker conferences in Las Vegas. Phone companies say the risk of this kind of attack is small, since the amount of time a victim would be vulnerable is minimal, and the attacker would have to be in proximity to the victim. But experiments, one using a common laptop and another using a prototype Bluetooth "rifle" that captured data from a mobile phone a mile away, have demonstrated that such attacks aren't so far-fetched.

Laurie, chief security officer of London-based security and networking firm ALD, discovered the vulnerability last November. Using a program called Bluesnarf that he designed but hasn't released, Laurie modified the Bluetooth settings on a standard Bluetooth-enabled laptop to conduct the data-collection attacks.

Then, German researcher Herfurt developed a program called Bluebug that could turn certain mobile phones into a bug to transmit conversations in the vicinity of the device to an attacker's phone.

Using Bluebug from a laptop, an attacker could instruct a target phone to call his phone. The phone would make the call silently and, once connected, open a channel for the attacker to listen to conversations near the targeted phone. The attacker's phone number would appear on the victim's phone bill, but if the attacker used a throwaway phone, the number would be out of service.

"(A victim) will know that his phone made a call that it shouldn't have made, but he won't necessarily come to the right conclusion that someone listened in on the conversation that he was having at that particular time," Laurie said. "He may think he accidentally pressed buttons to make the call while the phone was in his back pocket."

An attacker could also install a gateway on the victim's phone to reroute phone calls through his own phone so that he could hear and record conversations between parties without their knowledge. And he could send text messages from his computer through a victim's phone to another phone so the receiver would think the message originated from the victim. There would be no record of the sent message on the victim's phone unless the attacker planted it there.

"I can plant the message on the phone and make it look like he sent a message that he never sent. So when the FBI grabs the phone (for evidence), the message will be in the first guy's outbox," Laurie said. "It has really serious consequences."

The use of Bluetooth, a wireless technology that lets two devices exchange information over a short distance, is growing rapidly in Europe and the United States. About 13 percent of mobile phones shipped in the United States this year have Bluetooth, according to IDC research. The number will grow to about 53 percent globally and 65 percent in the United States by 2008.

These are just the phones. According to IMS Research, 2 million Bluetooth-enabled devices -- phones, laptops and PDAs -- are shipped weekly in the world. Laurie and Herfurt have only tested phones for vulnerabilities so far.

"They're talking about putting Bluetooth in everything: home security, medical devices," Laurie said. "If they don't do something about security there is some really serious stuff ahead of us."

The attacks, dubbed "Bluesnarfing" and "Bluebugging," work on several models of the most popular brands of mobile phones: Ericsson, Sony Ericsson and Nokia (Laurie provides a chart of affected phones on his website). In each case, the researchers needed access to the target phone for only a few seconds to conduct attacks.

Phones are vulnerable when they are in "discoverable" or "visible" mode, and the Bluetooth functionality is enabled. Visible mode lets Bluetooth phones find other Bluetooth phones in their vicinity so phone owners can exchange electronic contact information. Users can turn the visible mode off, but some models of Nokia can be attacked even when a user turns off the visible mode, Laurie said. The attacker would need to know the device's Bluetooth address, but Laurie said hacking programs available online make it possible to discover the address.

"The Nokia 6310 and 8910 series and the Sony Ericsson T610 are probably the worst affected because they are very popular phones," he said. They're "at least 70 percent of the market in

Laurie and Herfurt found problems with Motorola phones as well, but Siemens phones came out clean.

"Motorola said they would fix it in the current release so they started immediately to correct the problem," Laurie said, adding that the Motorola vulnerability was limited since the phones can be in visible mode for only brief periods when the owner exchanges information with other phone users.

Although phone owners can leave Nokia and Sony Ericsson phones in visible mode, the phone companies said people don't usually do this. They also said that because Bluetooth's range is generally 30 feet, an attacker could target only people who stayed within range long enough to be attacked.

But Laurie said that he achieved ranges closer to 50 feet in tests. With either range he could stand in a building lobby or hallway and collect data from mobile phones on floors above and below him. And a device demonstrated at DefCon could increase that range more than tenfold.

The BlueSniper "rifle," created by John Hering and colleagues at Flexilis as a proof-of-concept device, resembles a rifle. It has a vision scope and a yagi antenna with a cable that runs to a Bluetooth-enabled laptop or PDA in a backpack. Aiming the rifle from an 11th-floor window of the Aladdin hotel at a taxi stand across the street in Las Vegas, Hering and colleagues were able to collect phone books from 300 Bluetooth devices. They bested that distance and broke a record this week by attacking a Nokia 6310i phone 1.1 miles away and grabbing the phone book and text messages.1

"The odds of anybody (attacking a phone) are very slim to begin with," said Nokia spokesman Keith Nowak, noting that the only vulnerable model sold by the company in the United States is the 6310i. "But if you're worried about it, just turn the Bluetooth off or take it out of discoverable mode."

This works for regular phones, Laurie said, but not the Nokia car phone, which does not let users switch to hidden mode or turn off Bluetooth.

Nokia announced in May that it would have software upgrades to address the Bluetooth problem for all of its phones by the end of the summer, though this will not include car phones, and users would have to send in their phones to Nokia to have the patch installed.

Sony Ericsson told Laurie it fixed the problem. But when he examined the phones, he discovered they fixed the bugging problem but not the data-theft issue. Sony Ericsson could not be reached for comment.

Laurie found that most people forget to switch off Bluetooth and the visible mode after exchanging information with someone. About 50 percent to 70 percent of phones he examined in road tests were in visible mode and vulnerable to one type of attack or another. In one experiment, standing for about two hours in London Underground stations during rush hour, Laurie found 336 Bluetooth phones, 77 of which were vulnerable to attack.

He conducted a similar test at Britain's House of Parliament, carrying a laptop in his backpack. After going through security, he wandered the ground floor for 14 minutes looking at paintings and passing politicians while the attack ran automatically from his backpack. Of 46 Bluetooth devices he found, eight phones were vulnerable to attack.

Herfurt is working on developing Bluebug to run from a phone so an attacker wouldn't even need a bulky laptop.

Laurie said most people don't think they have valuable data on their phones, but many people store passwords, PINs and financial account numbers in their phones. A London shopkeeper he knows didn't care about the vulnerability until he attacked her phone and extracted the door and alarm codes for three of her businesses.

Michael Foley, executive director for the Bluetooth Special Interest Group, said the risk of attacks has gone down since the issue came to light. But as long as the risk is above zero, the industry group is taking it seriously and working with phone makers to address the problems.

"Now that the manufacturers are aware of these vulnerabilities, I don't think you'll see new phones coming out that are vulnerable to the attack," he said.

-------------------------------------------------------------------------------

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.








×
×
  • Create New...
""