HackDig : Dig high-quality web security articles for hacker

BlueBorne- the lethal attack to take over your devices

2017-09-13 14:25

The latest attack Blueborne is taking over by storm , lets read about it in concise, the attack method and the details of this bug.

A series of vulnerabilities have been unearthed in the implementation of Bluetooth which allows hackers to take over your computers/ tablets/ smartphones whenever Bluetooth is on.

A total of eight critical Bluetooth vulnerabilities were unearthed by researchers of Armis security which does not require any user interaction apart from the fact it does not need to be paired to the attacker’s device, or even to be set on discoverable mode.

How does BlueBorne work?

1. Attacker locates active Bluetooth connections in range.

2. Attacker obtains the device’s MAC address

3. With some enumeration based probing, operating system information is retrieved and specific exploit is chosen to compromise the device.

4. The vulnerability in implementation of the Bluetooth protocol is exploite with subsequent access

Attack pivot:

At this juncture, you can choose to either perform an MiTM ( Man-in-The-Middle attack) or gain complete control of the device

Reference:

1. https://www.armis.com/blueborne/

2. http://go.armis.com/blueborne-technical-paper

The post BlueBorne- the lethal attack to take over your devices appeared first on SecureLayer7.


Source: /secived-ekat-kcatta-lahtel-enrobeulb/ten.7reyaleruces.golb

Read:218 | Comments:0 | Tags:News blueborne bluetooth hacking hacking IOT

“BlueBorne- the lethal attack to take over your devices”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud