O'Reilly logo

Hacking Exposed Wireless, Third Edition by Johnny Cache, Joshua Wright

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 9

BLUETOOTH EAVESDROPPING

The ability to collect traffic passively from an active data exchange over the air is one of the greatest risk factors in wireless networking, Bluetooth being no exception. Whether you are evaluating the exposure of Bluetooth devices in your organization or attacking a Bluetooth network to manipulate devices, eavesdropping will be a necessary component of your analysis.

In this chapter, we look at some of the background information necessary to understand Bluetooth eavesdropping opportunities while presenting several tools that you can use for this attack. First, we look at Bluetooth Basic Rate (BR) and Bluetooth Enhanced Data Rate (EDR)—dubbed Bluetooth Classic—eavesdropping attacks, followed by Bluetooth ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required