Bluetooth attacks
A casino was once hacked through a fish tank thermometer in the past, which shows the importance of securing devices that are part of the Internet of Things (IoT). Bluetooth is not an exception and Bluetooth Low Energy (BLE) devices are used extensively by consumers and corporations, hence it is important for attackers to understand how to probe and attack them.
Important parts of the Bluetooth protocol layers are the following:
- Logical Link Control and Adaptation Protocol (L2CAP): This provides the data interface between the high layer data protocols and the applications.
- Radio Frequency Communications Protocol (RFCOMM): This emulates the functionalities required for serial communication interfaces such as EIA-RS-232 on a computer. RFCOMM can be accessed by AT commands and also the Wireless Application Protocol (WAP) through the Transmission Control Protocol/Internet Protocol (TCP/IP) stack and Object Exchange (OBEX) protocol. By default,...