يتم التشغيل بواسطة Blogger.

آخر الحلقات عن الفيسبوك

آخر حلقات الويندوز

الاقسام

آخر الحلقات الحصرية

صوت وصورة

أخبار المشاهير

توقيت المغرب

رياضة عالمية

Main Post

أرشيف المدونة الإلكترونية

آخر الحلقات عن الانترنت

آخر حلقات الحماية من الهاكرز

أقسام

Send Quick Massage

الاسم

بريد إلكتروني *

رسالة *

إشترك بالمدونة

الكتاب الرسميون

الدولي

آخر الحلقات عن منتجات جوجل

المشاركات الشائعة

عن الموقع

my

Visitors

الجمعة، 17 يوليو 2009

Bluetooth Security – The Tools,the Rules and stuff..


Posted by Mr Electroman

Everybody is having a Bluetooth phone nowadays,and we are merely concerned about the safety of these vulnerable and penetrable devices. BE it Nokia,Sony or Bluetooth Security - The Tools,the Rules and stuff.. any other brand,the technology remains same and provides whackers (wireless malicious hackers) new playground fortheir experiments.In this article,I will be listing some Bluetooth tools for security – both breaking and making.

Bluediving

It is a security and Bluetooth penetration testing suite and implements attacks like BlueSnarf,BlueSnarf++ and BlueSmack.Bluediving running on Linux - rdhacker.blogspot.com It features Bluetooth address spoofing,socket shells like AT and RFCOMM and also implements tools like L2CAP packet generator and connection resetter and RSCOMM scanner which are a must for any Bluetooth security enthusiastic.

Download BlueDiving

Blooover

Blooover (and Blooover 2) is a tool that is intended to run on J2ME enabled cell phones that appear to be comparably seamless.It serves as an audit tool that people use to check if their phones and phones of friends :P are vulnerable or not.

Bloover running on S40 - rdhacker.blogspot.com Bloover running on S40 - rdhacker.blogspot.com

Also there is also a tool “Super Bluetooth Hack” which is quite popular nowadays to hack into Bluetooth devices.

Download Blooover

Medieval Bluetooth Network Scanner

This program can analyze and scan your Bluetooth network, giving detailed information about local and remote devices found. You can also browse supported services of each device in a clear and straightforward user-interface. If you have a Bluetooth dongle installed on your PC, download "Medieval Bluetooth Network Scanner" now, it's totally free of charge and very handy!

Bluetooth Network Scanner running on Win Vista - rdhacker.blogspot.com Bluetooth Network Scanner running on Win Vista - rdhacker.blogspot.com It can deep scan all services of your Bluetooth device using this software.

Download Medieval Bluetooth Network Scanner

These software are free to use and quite handy to audit.However you,you ought to follow some basic rules of Bluetooth security for maximum protection-

  • Switch off Bluetooth when not in use.
  • Purchase only devices having long PIN codes.
  • Refrain from entering the PIN into Bluetooth device for pairing.
  • Limit the electric power itself to keep range of network within physical area (for Bluetooth enabled routers and devices other than cell phones).
  • Always generate initialization keys when 2 Bluetooth devices meet for the first time.
  • Never allow auto connection (Big loophole in Cell phone devices,easily exploited by a bit of social engineering. by el3ctR0m4n


التصنيفات


Bluetooth Security – The Tools,the Rules and stuff..

بواسطة : amine 7:44 ص


Posted by Mr Electroman

Everybody is having a Bluetooth phone nowadays,and we are merely concerned about the safety of these vulnerable and penetrable devices. BE it Nokia,Sony or Bluetooth Security - The Tools,the Rules and stuff.. any other brand,the technology remains same and provides whackers (wireless malicious hackers) new playground fortheir experiments.In this article,I will be listing some Bluetooth tools for security – both breaking and making.

Bluediving

It is a security and Bluetooth penetration testing suite and implements attacks like BlueSnarf,BlueSnarf++ and BlueSmack.Bluediving running on Linux - rdhacker.blogspot.com It features Bluetooth address spoofing,socket shells like AT and RFCOMM and also implements tools like L2CAP packet generator and connection resetter and RSCOMM scanner which are a must for any Bluetooth security enthusiastic.

Download BlueDiving

Blooover

Blooover (and Blooover 2) is a tool that is intended to run on J2ME enabled cell phones that appear to be comparably seamless.It serves as an audit tool that people use to check if their phones and phones of friends :P are vulnerable or not.

Bloover running on S40 - rdhacker.blogspot.com Bloover running on S40 - rdhacker.blogspot.com

Also there is also a tool “Super Bluetooth Hack” which is quite popular nowadays to hack into Bluetooth devices.

Download Blooover

Medieval Bluetooth Network Scanner

This program can analyze and scan your Bluetooth network, giving detailed information about local and remote devices found. You can also browse supported services of each device in a clear and straightforward user-interface. If you have a Bluetooth dongle installed on your PC, download "Medieval Bluetooth Network Scanner" now, it's totally free of charge and very handy!

Bluetooth Network Scanner running on Win Vista - rdhacker.blogspot.com Bluetooth Network Scanner running on Win Vista - rdhacker.blogspot.com It can deep scan all services of your Bluetooth device using this software.

Download Medieval Bluetooth Network Scanner

These software are free to use and quite handy to audit.However you,you ought to follow some basic rules of Bluetooth security for maximum protection-

  • Switch off Bluetooth when not in use.
  • Purchase only devices having long PIN codes.
  • Refrain from entering the PIN into Bluetooth device for pairing.
  • Limit the electric power itself to keep range of network within physical area (for Bluetooth enabled routers and devices other than cell phones).
  • Always generate initialization keys when 2 Bluetooth devices meet for the first time.
  • Never allow auto connection (Big loophole in Cell phone devices,easily exploited by a bit of social engineering. by el3ctR0m4n


تطوير : مدونة حكمات