Vulnerabilities in Bluetooth

The Bluetooth technology has shown itself both to be very convenient and powerful, but at the same time it has also shown that it has its own type of vulnerabilities that just aren't seen in other technologies, or at least not in the same form. Because of the way Bluetooth operates and is designed there is the definite possibility of new sorts of attacks, and some such have emerged within this environment.

Recently, a family of attacks known as BlueBorne has shown up in the marketplace. These are designed to target Bluetooth enabled capable devices. These attacks have proven to be quite disturbing and concerning as they rely on what amounts to a new communication mechanism rather than the old one. If we look at ...

Get Kali Linux Wireless Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.