O'Reilly logo

Seven Deadliest Wireless Technologies Attacks by Brad Haines

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 3

Bluetooth Attacks

Publisher Summary

Bluetooth is actually a suite of protocols and functions operating in the 2.4 GHz ISM band along the same as 802.11b/g/n Wi-Fi. Bluetooth has undergone some revisions and multiple versions of the protocol exist. Bluetooth 1.2 and 2.0 1 Enhanced Data Rate (EDR), are the most common in the marketplace. Bluetooth 1.2 supports approximately 725 Kbps throughput that is enough for devices such as mouse, keyboards, printers, and headsets. Revisions to the standards culminating in Bluetooth 2.0 includes EDR, which bumps the maximum throughput to 3 Mbps on compatible devices for larger data such as photos or music files. Bluetooth attacks are against targets of opportunity. In the case of Bluetooth, its design ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required