Blue tooth is a device used for effective transmission of data at low power at the same with reasonable speed .
Each Bluetooth device has its own device address and it also has a name using which it communicates with another devices , what happens if we can change the blue tooth address and name similar to another Bluetooth thus we can gain access to devices controlled by the hacked Bluetooth .
This method of duplicating the address of a Bluetooth to resemble another Bluetooth device is called blue tooth spoofing .... how to do this ?
got curious , there are some other methods like sending 100's of files to a target device using spoofed Bluetooth device , thus the receiving Bluetooth device gets crashed ....
want to know how to do these Bluetooth attacks , watch the slides below .. .
0 comments:
Post a Comment