Bluetooth Vulnerabilities & Attacks Flashcards

1
Q

What is Insecure Device Pairing?

A

Occurs when Bluetooth devices establish a connection without proper authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Device Spoofing?

A

attacker can impersonate a legitimate Bluetooth device to trick a user into connecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an On-Path Attack?

A

exploits a vulnerability in the Bluetooth communications protocol so that the attacker can intercept and alter the communication between two Bluetooth devices without either party being aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Bluejacking?

A

Attacker will send unsolicited messages to a Bluetooth enabled device as a prank to test the vulnerability of the device without causing serious harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Bluesnarfing attack?

A

involves the unauthorized access to a device through its Bluetooth connection to steal information like contacts, call logs, and text messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Bluebugging attack?

A

Takes a step further than Bluesnarfing by allowing attackers to take control of a device’s Bluetooth functions and potentially use the device to make calls, send text messages, or access the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Bluesmack attack?

A

Bluetooth type of attack that focuses on a denial of service, where an attacker overwhelms a device by sending a large amount of data to cause it to crash or become unresponsive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Bluebourne attack?

A

target devices via Bluetooth, and it can spread through the air to potentially infect numerous devices within seconds without requiring any intervention from the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly