Like any successful hack, a Bluetooth attack includes understanding the technology behind your target as well as scanning and reconnaissance analysis; it concludes with attack and exploitation. In this chapter, we’ll examine the core concepts of the Bluetooth “Classic” specification (including Bluetooth technologies prior to the Bluetooth Smart specification), followed by a look at the tools and techniques for Bluetooth scanning and reconnaissance. This chapter covers recommendations for hardware devices that can be used for Bluetooth analysis (commercial Bluetooth adapters and other special-purpose hardware), multiple options for identifying Bluetooth devices near you, and steps ...
Get Hacking Exposed Wireless, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.