Part 6 - Bluetooth Security
Part 6 - Bluetooth Security
1. Introduction
2. Bluetooth technical specification
3. Bluetooth security
4. Conclusion
▪ Attacks
✓ Cryptanalytic attacks
✓ Attacks on the Bluetooth stack [8]
✓ Bluetooth snarfing [8]
✓ Bluejacking [9]
✓ Bluebugging [10]
✓ Bluetooth wardriving [11]