Browsing tag

bluetooth

New Bluetooth Flaws Let Attackers Impersonate Legitimate Devices

Adversaries could exploit newly discovered security weaknesses in Bluetooth Core and Mesh Profile Specifications to masquerade as legitimate devices and carry out man-in-the-middle (MitM) attacks. “Devices supporting the Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure that could allow an attacker to impersonate a legitimate device during pairing,” the Carnegie […]

New Bluetooth Flaws Let Attackers Impersonate Legitimate Devices

Adversaries could exploit newly discovered security weaknesses in Bluetooth Core and Mesh Profile Specifications to masquerade as legitimate devices and carry out man-in-the-middle (MitM) attacks. “Devices supporting the Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure that could allow an attacker to impersonate a legitimate device during pairing,” the Carnegie […]

Apple’s Find My Network Can be Abused to Exfiltrate Data From Nearby Devices

Latest research has demonstrated a new exploit that enables arbitrary data to be uploaded from devices that are not connected to the Internet by simply sending “Find My” Bluetooth broadcasts to nearby Apple devices. “It’s possible to upload arbitrary data from non-internet-connected devices by sending Find My [Bluetooth Low Energy] broadcasts to nearby Apple devices […]

RadareEye – Scan Nearby devices [BLE, Bluetooth And Wifi]

  A tool made for specially scanning nearby devices[BLE,Bluetooth & Wifi] and execute our given command on our system when the target device comes in between range.   NOTE:- RadareEye Owner will be not responsible if any user performs malicious activities using this tool. Use it for Learning purpose only. Installation of RadareEye : git […]

How to use headphones or Bluetooth to hack and take control of any Android device

A recent research published by vulnerability testing specialists from Purdue University details a new exploit that abuses some Android operating system smartphones through the use of malicious peripheral devices (specifically through Bluetooth and USB). The application processor of almost any relatively recent smartphone model uses the AT Command Interface to launch high-level commands to the […]

Turn off your Bluetooth. Experts discover new Bluetooth KNOB vulnerability

A group of vulnerability testing researchers has revealed a new method to break Bluetooth’s encryption key negotiation protocol; the attack, dubbed ‘Key Negotiation of Bluetooth’ (KNOB) is possible on any device that supports the Bluetooth protocol and has required an early response from Google security teams for correction. Researchers Kasper Rasmussen and Daniele Antonioli, from […]

Bluetana app detects gas pumps card skimmers in 3 seconds

Bluetana takes 3 seconds to detect illegal card skimmers, unlike law enforcement agencies who can take up to 30 minutes for inspection. In 2018, the U.S. Secret Service estimated that every year, approximately $1 billion are stolen by crooks using card skimmers. This makes it over $350,000 every day and highlights the fact that it […]

New Bluetooth vulnerability allows hacking iOS and Android devices

Wireless protocols are not exempt from cybersecurity risks. IT security audit specialists say that more than one billion Bluetooth-enabled devices (smartphones, IoT equipment, laptops, switches, and others) present a critical vulnerability that, if exploited, would allow hackers to intercept transmitted data between two connected devices, especially smartphones. Tracked as CVE-2019-9506, this vulnerability is present in […]

iPhone XI Could Play Music On Two Audio Devices Simultaneously

If reports from Macotakara are to be believed, the 2019 iPhone will feature dual Bluetooth audio support. The current generation of iPads and iPhones support streaming multiroom audio via AirPlay 2 speakers. Now, Apple plans to further improve Bluetooth in next-generation iPhones to allow users to stream audio to two AirPods or other audio devices […]

First Millimeter-sized Bluetooth Chip Invented To Send Low-Energy Data Packets

We are surrounded by Bluetooth radio signals and most of the devices that we see around — smartphones, wireless computer networks, and wireless earbuds — use Bluetooth transmitters for transmitting signals. However, contemporary transmitters have two problems: heavy power consumption which is why Bluetooth earbuds usually have a talk time of just 4 to 5 hours, […]

New Samsung Galaxy S10 review and features

The all new Samsung Galaxy S10 family has been released by Samsung on 8th March, 2019 and despite the high price & a lazy start, the Galaxy S10 has made a record in pre-orders for Samsung in the US. When the pre-orders for Samsung Galaxy S10 family began, there were rumors and conflicting reports about […]

Critical SHAREit Flaw Gives Attackers Full Access To Device Files

Data sharing apps like SHAREit and Xender have transformed the way files are shared, since their release a few years ago. The apps transfer files over wifi which is much faster compared to sending files using Bluetooth. However, a recent report by Threat Post disclosed two major vulnerabilities in the popular file sharing app, SHAREit, which […]

Vulnerability in Xiaomi scooters could put the users’ life at risk

The flaw allows sending unauthenticated commands via Bluetooth to the scooter Although the use of smart devices has simplified many daily tasks, network security and ethical hacking specialists also emphasize that over trusting an unsafe device could be detrimental to users, even could compromise their physical integrity. This seems to be the case with electric […]

Intel Discovers And Publishes New Bluetooth Vulnerability

Turns out, Intel has now discovered and published a new Bluetooth vulnerability, which could help intercept and manipulate transmissions between two compatible devices. The reports say that the newly discovered vulnerability has the potential to allow cybercriminals to intercept transmissions between two affected Bluetooth-compatible devices and also to relay malicious signals back and forth between […]

Update your devices: New Bluetooth flaw lets attackers monitor traffic

The Bluetooth flaw also opens door to a man-in-the-middle attack. The IT security researchers at Israel Institute of Technology have discovered a critical security vulnerability in some implementations of the Bluetooth standard in which not all the parameters involved are appropriately validated by the cryptographic algorithm. If the vulnerability is exploited it can allow a remote attacker within the range of […]

DNS rebinding attack puts half a billion IoT devices at risk

Armis, an Internet of Things (IoT) security vendor and cyber-security firm, reports that about half a billion smart devices being used around the globe are vulnerable to a decade-old attack called DNS rebinding. It is the same firm that previously detected the presence of a BlueBorne vulnerability in the Bluetooth protocol. The company published its […]

How to Enable/Fix Bluetooth Problem in Kali Linux 2017.3

If you are running Kali Linux and your Bluetooth is not working. Let’s fix that. It will be up and running in no time. First of all, open a terminal window. then type this command sudo lsmod | grep bluetooth This will search for “bluetooth” in the lsmod. Now you need to enable bluetooth using […]

BlueMaho v090417 – Bluetooth Security Testing Suite

BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on python, uses wxPyhon. It can be used for testing BT-devices for known vulnerabilities and major thing to do – testing to find unknown vulns. Also it can form nice statistics. 1.2. What it can do? […]

BtleJuice Framework – Bluetooth Smart (LE) Man-in-the-Middle Framework

BtleJuice is a complete framework to perform Man-in-the-Middle attacks on Bluetooth Smart devices (also known as Bluetooth Low Energy). It is composed of: an interception core an interception proxy a dedicated web interface Python and Node.js bindings How to install BtleJuice ? Installing BtleJuice is a child’s play. First of all, make sure your system […]