Безопасность информационных технологий (Sep 2012)

Unauthorized Data Theft from Bluetooth-Enabled Devices Using RFCOMMVulnerabilities

  • A. G. Beltov,
  • I. Y. Zhukov,
  • A. V. Novitskiy

Journal volume & issue
Vol. 19, no. 2S
pp. 57 – 59

Abstract

Read online

The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in RFCOMM-level of Bluetooth protocols stack. The described attack is even more dangerous because of the fact that a hacker can also implement any AT-command on the attacked mobile phone.

Keywords