Bluebugging

from Wikipedia, the free encyclopedia

Bluebugging allows experienced cell phone users to execute (internal) commands on other cell phones that are open to this type of attack without the target person being aware of it.

This type of attack on Bluetooth- enabled cell phones was made public by Martin Herfurt in March 2004 at CeBIT in Hanover. Cell phones of older generations are particularly susceptible.

If the attacker does not have special equipment, he must be within 10 m of the target mobile phone. Special equipment can also cover greater distances.

The attacker has various options for using the mobile phone, for example reading and sending SMS, making and listening in on calls, editing the address book or connecting to the Internet.

literature

  • Mazliza Othman: Principles of Mobile Computing and Communications. Taylor & Francis Group, Boca Raton 2008, ISBN 978-1-4200-6159-8 .

See also

source

  1. Official Bluetooth homepage (en) ( Memento of the original from April 5, 2010 in the Internet Archive ) Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice. @1@ 2Template: Webachiv / IABot / www.bluetooth.com

Web links