<aside>
<img src="/icons/bluetooth_gray.svg" alt="/icons/bluetooth_gray.svg" width="40px" /> Bluetooth is a wireless technology that lets devices like phones, tablets, and headphones connect to each other and share information without needing cables.
</aside>
Vulnerabilities Include:
Insecure pairing
- Occurs when Bluetooth devices establish a connection without proper authentication
Device spoofing
- Occurs when an attacker impersonates a device to trick a user into connecting
On-path attacks
- Exploits Bluetooth protocol vulnerabilities to intercept and alter communications between devices without either party being aware
Different Types of Bluetooth Attacks
Bluejacking
- Sending unsolicited messages to a Bluetooth device
- Often used for pranks or testing vulnerabilities
Bluesnarfing
- Unauthorized access to a device to steal information like contacts, call logs, and text messages
Bluebugging
- Allows attackers to take control of a device’s Bluetooth functions
- Can make calls, send messages, or access the internet
Bluesmack
- Denial-of-service attack by overwhelming a device with data, causing it to crash or become unresponsive
Blueborne