Similar to wireless hacking on IEEE 802.11 networks, Bluetooth hacking also exists on the IEEE 802.15 networks as well. As we know, a Bluetooth connection is established over a short distance, by creating an ad hoc network:
The following is a short list of various types of Bluetooth attacks:
- Bluejacking: This allows a malicious user to send unsolicited messages over a Bluetooth connected to another Bluetooth-enabled device.
- Bluesnarfing: This is when an attacker is able to access the information on another Bluetooth-enabled device. Information may include the victim's email messages, their address book details, or SMS messages.
- Bluesniffing: The concept of war driving in search of Bluetooth-enabled devices.
- Bluebugging: This is when an attacker is able to take control of a victim's Bluetooth-enabled device. This allows the attacker to listen on telephone...