Features: Mobile Phone Phreaking Document covers phreaking methods, systems and setups
Category: Articles
Articles on Bluejacking
PA168 Web Interface Password Brute Forcer
Features: The following tool can be used to “break” into PA168 based phone’s password protected web interface by brute forcing the password.
Stealing Bluetooth Link Keys
Features: This document describes that there are 2 items required to attack a bluetooth pair The ability to spoof a BD_ADDR and possession of a secret key also known as a Link Key This document discusses the possibilities of obtaining…
Exploiting Open Functionality in SMS-Capable Cellular Network
Features: This is a PDF which describe in detail research which evaluates the security impact of the (SMS) interface on the availability of the cellular phone network. Specifically, it demonstrates the ability to deny voice service to large metropolitan areas…