CHAPTER 9

BLUETOOTH EAVESDROPPING

The ability to collect traffic passively from an active data exchange over the air is one of the greatest risk factors in wireless networking, Bluetooth being no exception. Whether you are evaluating the exposure of Bluetooth devices in your organization or attacking a Bluetooth network to manipulate devices, eavesdropping will be a necessary component of your analysis.

In this chapter, we look at some of the background information necessary to understand Bluetooth eavesdropping opportunities while presenting several tools that you can use for this attack. First, we look at Bluetooth Basic Rate (BR) and Bluetooth Enhanced Data Rate (EDR)—dubbed Bluetooth Classic—eavesdropping attacks, followed by Bluetooth ...

Get Hacking Exposed Wireless, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.