Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
P. 1
Bluetooth Hacking

Bluetooth Hacking

Ratings: (0)|Views: 150|Likes:
Published by anonymouschuques

More info:

Published by: anonymouschuques on Nov 17, 2008
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Bluetooth Hacking – Full Disclosure @ 21C3
Hacking Bluetooth enabled mobilephones and beyond –
Full Disclosure
21C3: The Usual Suspects
21st Chaos Communication CongressDecember 27th to 29th, 2004Berliner Congress Center, Berlin, Germany
Adam LaurieMarcel HoltmannMartin Herfurt
Bluetooth Hacking – Full Disclosure @ 21C3
Who we are
Adam Laurie
CSO of The Bunker Secure Hosting Ltd.
Co-Maintainer of Apache-SSL
DEFCON Staff/Organiser
Marcel Holtmann
Maintainer and core developer of the Linux BluetoothStack BlueZ
Martin Herfurt
Security Researcher
Founder of trifinite.org
Bluetooth Hacking – Full Disclosure @ 21C3
Outline (1)
Bluetooth Introduction
 Technology Overview
 The BlueSnarf Attack
 The HeloMoto Attack
 The BlueBug Attack
Long-Distance Attacking

Activity (7)

You've already reviewed this. Edit your review.
1 hundred reads
micky88mouse liked this
Sanjay Jhony liked this
malamidis1 liked this
happyboy1376 liked this
vick E liked this
ddaju liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->