Безопасность информационных технологий (Sep 2012)
Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities
Abstract
The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in OBEX and OBEX FTP profiles of Bluetooth protocols stack.