O'Reilly logo

Hacking Exposed Wireless, Third Edition by Johnny Cache, Joshua Wright

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7

BLUETOOTH CLASSIC SCANNING AND RECONNAISSANCE

Like any successful hack, a Bluetooth attack includes understanding the technology behind your target as well as scanning and reconnaissance analysis; it concludes with attack and exploitation. In this chapter, we’ll examine the core concepts of the Bluetooth “Classic” specification (including Bluetooth technologies prior to the Bluetooth Smart specification), followed by a look at the tools and techniques for Bluetooth scanning and reconnaissance. This chapter covers recommendations for hardware devices that can be used for Bluetooth analysis (commercial Bluetooth adapters and other special-purpose hardware), multiple options for identifying Bluetooth devices near you, and steps ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required