O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bluesmacking

The first type of attack we will cover is known as Bluesmacking, and is one of the older types of attacks against this protocol. You will find in our explorations of this attack that it is a variation of a common attack against networks, devices and applications known as a Denial-of-service.

In a nutshell, when we carry out a Bluesmacking attack, we are carrying out an attack through which a specially crafted packet can make a device unusable. This attack works by transmitting a data packet that exceeds the maximum packet size available on Bluetooth devices. The end result is that the device cannot process the packet and the target becomes the victim of a Denial-of-service. This attack is a variation of the well-known attack ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required