Bluetooth Vulnerabilities & Attacks Flashcards
What is Insecure Device Pairing?
Occurs when Bluetooth devices establish a connection without proper authentication
What is Device Spoofing?
attacker can impersonate a legitimate Bluetooth device to trick a user into connecting
What is an On-Path Attack?
exploits a vulnerability in the Bluetooth communications protocol so that the attacker can intercept and alter the communication between two Bluetooth devices without either party being aware
What is Bluejacking?
Attacker will send unsolicited messages to a Bluetooth enabled device as a prank to test the vulnerability of the device without causing serious harm
What is a Bluesnarfing attack?
involves the unauthorized access to a device through its Bluetooth connection to steal information like contacts, call logs, and text messages.
What is a Bluebugging attack?
Takes a step further than Bluesnarfing by allowing attackers to take control of a device’s Bluetooth functions and potentially use the device to make calls, send text messages, or access the Internet
What is a Bluesmack attack?
Bluetooth type of attack that focuses on a denial of service, where an attacker overwhelms a device by sending a large amount of data to cause it to crash or become unresponsive.
What is a Bluebourne attack?
target devices via Bluetooth, and it can spread through the air to potentially infect numerous devices within seconds without requiring any intervention from the user.