Bluetooth Security: Preliminary Study [HTML] [PDF] [PS] [TEX]
Overview of the Bluetooth attacking tools I found on the internet [HTML] [PDF] [PS] [TEX]
SRS Software Requirement Specification[HTML] [PDF] [PS] [TEX]
Report of my internship [HTML] [PDF] [PS] [TEX]
Presentation after my internship (dutch) [PPT] [PDF] [MHT]
Master Thesis (high distinction) [PDF]
links:
- 21C3 Adam Laurie
- 21C3 Bluetooth Hacking
- 3890 Nokia 6310i Bluetooth OBEX Message DoS
- A Security Evaluation of Bluetooth Profiles, Candoin
- A.L.Digital The Bunker Press
- About Pentest
- Affix - End User Manual
- Affix Bluetooth Protocol Stack For Linux
- Affix Introduction
- Alexander Geschonneck's Security Site Wireless
- An Algebraic Attack on the Bluetooth Key Stream Generator
- Analysis of the E0 Encryption System
- Ask Engadget What?s the best Bluetooth headset - Engadget - www.engadget.com
- ASTALAVISTA SECURITY GROUP Astalavista.com Security Directory Computer Network Hacking Program
- ASTALAVISTA SECURITY GROUP Astalavista.com Security Directory Computer Network Hacking Programming Wireless P2P Windows Linux
- ASTALAVISTA SECURITY GROUP _ BlueTooth Security
- ASTALAVISTA SECURITY GROUP _ Bluetooth tools
- Attacks on the Bluetooth stack
- BeeCon - MicroBlue
- Benhui.Net
- bloover
- BlueAlert Download
- BlueAlert TDK download
- BlueAlert TDK Info
- BlueBug
- bluefish
- Bluejacking ain't hijacking The Register
- BluejackQ Bluesnarfing
- bluejackQ.com - Home page
- BluePrinting
- Blueserker Berserk about Bluetooth
- Blueserker __ Berserk about Bluetooth
- BlueSmack
- Bluesnarfing tools 'spreading quickly' - ZDNet UK News
- Bluesniff - Proof of Concept Bluetooth Wardriver
- BlueSniper Rifle short movie
- BlueSpam
- Bluetooth - 21C3
- Bluetooth - Table of Contents
- Bluetooth @ developer.axis.com
- Bluetooth and Linux
- Bluetooth Applications in New Media Technology
- Bluetooth attack N6310i - SET610 - TelecomVergelijker.nl
- Bluetooth attack vector for mobile phones
- Bluetooth chews on future plans Tech News on ZDNet
- Bluetooth chews on future plans _ Tech News on ZDNet
- Bluetooth Development Kits
- bluetooth device security database btdsd
- Bluetooth dongle modification
- Bluetooth Encryption Engine
- Bluetooth Group Outlines Strategy
- Bluetooth Hacking 21c3 slides
- BlueTooth Hacking Step by Step Guide News
- Bluetooth Mobile9 News
- Bluetooth on XP
- Bluetooth phone book dumper (Linux BlueZ)
- Bluetooth phone hacking tools spreading quickly News
- Bluetooth phones at risk from 'snarfing' - ZDNet UK News
- Bluetooth Protocol and Security Architecture Review par Korak Dasgupta, University of Tennessee
- Bluetooth Scare a Load of Hooey
- Bluetooth Security and Attacks Sil Janssens
- Bluetooth security guidelines
- Bluetooth Security Helger Lipmaa
- Bluetooth Security Shot Away
- Bluetooth Security
- Bluetooth Security_ Preliminary Study [HTML]
- Bluetooth server blog
- Bluetooth sockets
- Bluetooth Stack introduction
- Bluetooth Tutorial - Start
- Bluetooth Tutorial Palowireless
- Bluetooth Vulnerabilities Fact and Fiction WiCon 2004
- Bluetooth Wireless - Help - Wireless Security
- Bluetooth- Security - MCyclopedia of New Media
- Bluetooth- Security - M_Cyclopedia of New Media
- Bluetooth.org - The Official Bluetooth Membership Site
- Bluewire - Graphical user interface for BlueZ
- BlueZ - Official Linux Bluetooth protocol stack
- BlueZ Bluetooth stack
- Bookpool Bluetooth Security
- Brainboxes BlueTooth hardware and Linux
- Brainboxes Teams With Ingenico
- Broadcom(R) Upgrades Market Leading WIDCOMM(R) Bluetooth(R) Software With Enhanced Security, CD-Like Wireless Stereo Sound and
- Broadcom(R) Upgrades Market Leading WIDCOMM(R) Bluetooth(R) Software With Enhanced Security, CD
- BTClass
- btdsd bluetooth device security database
- Building a BlueSniper Rifle
- Chicago Tribune After years of promise, Bluetooth hits its stride
- Chicago Tribune _ After years of promise, Bluetooth hits its stride
- CIO Unencumbered and Insecure
- CIO _ Unencumbered and Insecure
- Computerworld Bluetooth and ZigBee Their similarities and differences
- Cryptanalysis of the Bluetooth Stream Cipher, C. De Canni?
- Daily Wireless Wireless News, Research, Insight, and Analysis - 'BlueSnarfing' Revisited
- Daily Wireless Wireless News, Research, Insight, and Analysis - Many Wireless Devices Vulnerabl
- Daily Wireless Wireless News, Research, Insight, and Analysis - Many Wireless Devices Vulnerable to 'Bluesnarf' attack
- deseretnews.com High-tech delights have Achilles' heel security
- Digital Munition
- Direct Sequence vs. Frequency Hopping
- Documento senza titolo
- E2X Gear - Extract 2 Transmit
- EE206A Home Page (Spring 2002)
- Embedded.com - 802.11b is dead - long live Bluetooth
- Ericsson Halts Bluetooth Development
- Expert Gaps still pain Bluetooth security Tech News on ZDNet
- F-Secure Computer Virus Information Pages Skulls.B
- Flaws in Digital Wireless Technology Said to Allow Eavesdropping
- floAt's Mobile Agent Online
- Free Nokia Cellular Phones Bluetooth hack
- Full-Disclosure_ [Full-disclosure] DMA[2005-0401a] - 'IVT BlueSoleil Directory Transversal'
- FullDisclosure Re Bluesnarf attacks
- FullDisclosure_ Re_ Bluesnarf attacks
- Geek.com Geek News - BlueSnarfing why you might want to turn off BT when not in use
- Gizmodo IMterview With Bluetooth Hacking Flexilis's John Hering
- GNOME Bluetooth Subsystem
- Group Awareness in Bluetooth
- Hackers can attack Bluetooth devices (phoneArena)
- Hardware Implementation of Bluetooth Security
- HID implementation for the BlueZ stack
- Holtmann Organization
- Howstuffworks How Bluetooth Works
- httpwww.esat.kuleuven.ac.be~jlanostreamdesigns.htm#e0
- http___trifinite.org_Downloads_21c3_Bluetooth_Hacking.pdf
- http___trifinite.org_trifinite_stuff_blooover.html
- http___www.alighieri.org_tools_bluesnarfer.tar.gz
- http___www.alighieri.org_tools_bluetooth.tar.gz
- http___www.esat.kuleuven.ac.be_~jlano_stream_designs.htm#e0
- ICAT Metabase A CVE Based Vulnerability Database
- Impronto RoCoCo
- Index of -btdsd-download
- Information Security News Desk
- InformationWeek Bluetooth Security Bluetooth Handy, But Worrisome december 6, 2004
- Inside Bay Area - Alameda Times-Star - HOME PAGE
- java.net Getting Started with Java and Bluetooth
- Jons Guides Bluetooth Help Guide Introduction
- Klings.NoWires() - J2ME and Bluetooth
- Linksys USBBT100 - Bluetooth USB Adapter
- Linux driver for the 3Com Bluetooth PCMCIA card
- Man-In-The-Middle Attack Using Bluetooth In A WLAN Interworking Environnment
- MeetingPoint - Downloads
- Mike Price McAfee soft
- Mobile & Wireless Advisor Bluetooth Why Invisible Is Dangerous -- ReefEdge Mobile Domain Certi
- Mobile & Wireless Advisor Bluetooth Why Invisible Is Dangerous -- ReefEdge Mobile Domain Certicom movianVPN Business Techno
- Mobile & Wireless Advisor Bluetooth Why Invisible Is Dangerous -- ReefEdge Mobile Domain C
- Mobile Trojan launches Skulls attack Tech News on ZDNet
- MobiLuck Bluetooth software
- Motorola partners with sunglasses-maker Oakley Tech News on ZDNet
- Motorola partners with sunglasses-maker Oakley _ Tech News on ZDNet
- Multiple radios boggle cell phone design
- Nederlandse Pocket PC-club
- nfc-forum.org
- Nicolas Sklavos Homepage
- Nokia 6310i Phones Can Be Reset By Remote Users Sending Malformed OBEX Packets Via Bluetooth
- Nokia admits multiple Bluetooth security holes - ZDNet UK News
- Nokia announced a firmware upgrade for their vulnerable models
- Nokia releases 'invisible' Bluetooth security fix - ZDNet UK News
- Nokia6310i.txt
- OpenOBEX Overview
- Overview of the Bluetooth attacking tools I found on the internet [HTML]
- palowireless Wireless Resource Center
- Pentest Limited - Specialists in security and Oracle
- Pervasive Computing with Bluetooth
- Ping of Death
- Presentation after my internship (dutch) [PPT]
- Prevent Wardriving Paint Your Building - Open Source Web Development
- Prevent Wardriving_ Paint Your Building - Open Source Web Development
- Pulling for Bluetooth
- Rambling comments... Bluetooth on XP
- Reliability and Noise Immunity in Bluetooth
- Report of my internship [HTML]
- Roadmap boosts Bluetooth bandwidth
- RSA Security - 2.1.5 What is a stream cipher_
- Seattle Post-Intelligencer As cell phones get stronger and complicated, are viruses a threat
- Secunia - Advisories - WIDCOMM Bluetooth Connectivity Software Buffer Overflow Vulnerabilities
- Securing your Bluetooth devices - Computerworld
- Security Cavities Ail Bluetooth - Wired News
- Security in Bluetooth An overview of Bluetooth security
- Security Weaknesses in Bluetooth
- SecurityFocus HOME News Bluetooth is attack vector for mobile phones
- SecurityFocus HOME News Security Researchers Nibble at Bluetooth
- Service Discovery in Bluetooth
- Setting up a Bluetooth Packet Transport Link
- SMan Renegade's Ericsson Mobile Phone Site
- SMOWireless Update 0305
- SMO_Wireless Update 03_05
- SonyEricssonT610.txt
- Source Code for Cabir Cell Phone Worm Released
- SRS Software Requirement Specification[HTML]
- SSC - Linux - Bluetooth
- Study Bluetooth security should raise red flags - Computerworld
- Symantec Security Response - SymbOS.Cabir
- Technology News Security New Worm Attacks Mobile Phones with Symbian OS
- Technology News Technology Bluetooth Security Threat Starting To Spread
- Technology News_ Security_ New Worm Attacks Mobile Phones with Symbian OS
- Technology News_ Technology_ Bluetooth Security Threat Starting To Spread
- The benefits of Bluetooth - vnunet.com
- The Bluetooth Location Tracker Project Main
- The Bunker
- The Death of Bluetooth Intel Moves to Ultrawideband
- The first mobile phone worm - Cabir
- The role of Bluetooth technology in transforming the value network ...
- The Wireless Short List - Popular Science
- This Time, Cell Phone Virus Is for Real
- Tik-111.550 Bluetooth
- TKK - TKO - Tik-86.174 Seminar on Human-Computer Interaction L
- Tom's Hardware Guide Business Reports Defcon 12's Fear and Hacking in Vegas - Bluetooth Vulnera
- Tom's Hardware Guide Business Reports Defcon 12's Fear and Hacking in Vegas - Bluetooth Vulnerabilities
- TomsNetworking
- trifinite album
- trifinite.blog - the weblog of the trifinite.group
- trifinite.download
- trifinite.org - the home of the trifinite.group
- Trojan gets the cell phone message Tech News on ZDNet
- Trojan gets the cell phone message _ Tech News on ZDNet
- UNrooted.net Hacker Area
- Using GSM-UMTS for Single Sign-On
- Viruses, anti-viruses, events, facts and commentary
- Vulnerability in Bluetooth Explained
- War Nibbling Bluetooth Insecurity
- What is bluesnarfing - a definition from the leading computer technical encyclopedia, dictionar
- What is bluesnarfing - a definition from the leading computer technical encyclopedia, dictionary and glossary
- What is frequency-hopping spread spectrum - a definition from the leading computer technical en
- What is frequency-hopping spread spectrum - a definition from the leading computer technical encyclopedia, dictionary and gloss
- Wi-Fi Networking News Bluetooth to Made Vaguely Faster, Harder to Use
- WIDCOMM Bluetooth Connectivity Solutions
- Widcomm BTW (Microsoft Windows BT stack) Directory Transversal
- Will Bluetooth Change the Windows GUI
- Wired News Security Cavities Ail Bluetooth
- Wireless Application Programming with J2ME and Bluetooth
- Wireless Handheld Security Articles - Bluefire Security Technologies
- Xonio - 23 Handys im Hacker-Test - „Denial of Service“-Attacke Absturz mitten im Gespräch
- Xonio - 23 Handys im Hacker-Test - ?Denial of Service?-Attacke Absturz mitten im Gespr?
- Year-old Bluetooth vulnerability invites mobile worm - ZDNet UK News
- zigbee.org