O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Vulnerabilities in Bluetooth

The Bluetooth technology has shown itself both to be very convenient and powerful, but at the same time it has also shown that it has its own type of vulnerabilities that just aren't seen in other technologies, or at least not in the same form. Because of the way Bluetooth operates and is designed there is the definite possibility of new sorts of attacks, and some such have emerged within this environment.

Recently, a family of attacks known as BlueBorne has shown up in the marketplace. These are designed to target Bluetooth enabled capable devices. These attacks have proven to be quite disturbing and concerning as they rely on what amounts to a new communication mechanism rather than the old one. If we look at ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required