Stealing Bluetooth Link Keys

Features: This document describes that there are 2 items required to attack a bluetooth pair The ability to spoof a BD_ADDR and possession of a secret key also known as a Link Key This document discusses the possibilities of obtaining…

HelloMoto

Features: Exploits incorrect implementation of the Trusted Device handle Uses Sending of Vcard to break through and add itself to “trusted devices” Once on trusted device list , Attacker can take control of phone through AT-commands

Green Plaque

Features: This Application simply finds discoverable bluetooth devices Requires the Affix Bluetooth protocol libraries Program will cause damage to the found device. Sister of Redfang which was to find non-discoverable bluetooth devices