13.3.06

Bluetooth Security Research

Bluetooth Security: Preliminary Study [HTML] [PDF] [PS] [TEX]
Overview of the Bluetooth attacking tools I found on the internet [HTML] [PDF] [PS] [TEX]
SRS Software Requirement Specification[HTML] [PDF] [PS] [TEX]
Report of my internship [HTML] [PDF] [PS] [TEX]
Presentation after my internship (dutch) [PPT] [PDF] [MHT]
Master Thesis (high distinction) [PDF]


links:

21C3 Adam Laurie
21C3 Bluetooth Hacking
3890 Nokia 6310i Bluetooth OBEX Message DoS
A Security Evaluation of Bluetooth Profiles, Candoin
A.L.Digital The Bunker Press
About Pentest
Affix - End User Manual
Affix Bluetooth Protocol Stack For Linux
Affix Introduction
Alexander Geschonneck's Security Site Wireless
An Algebraic Attack on the Bluetooth Key Stream Generator
Analysis of the E0 Encryption System
Ask Engadget What?s the best Bluetooth headset - Engadget - www.engadget.com
ASTALAVISTA SECURITY GROUP Astalavista.com Security Directory Computer Network Hacking Program
ASTALAVISTA SECURITY GROUP Astalavista.com Security Directory Computer Network Hacking Programming Wireless P2P Windows Linux
ASTALAVISTA SECURITY GROUP _ BlueTooth Security
ASTALAVISTA SECURITY GROUP _ Bluetooth tools
Attacks on the Bluetooth stack
BeeCon - MicroBlue
Benhui.Net
bloover
BlueAlert Download
BlueAlert TDK download
BlueAlert TDK Info
BlueBug
bluefish
Bluejacking ain't hijacking The Register
BluejackQ Bluesnarfing
bluejackQ.com - Home page
BluePrinting
Blueserker Berserk about Bluetooth
Blueserker __ Berserk about Bluetooth
BlueSmack
Bluesnarfing tools 'spreading quickly' - ZDNet UK News
Bluesniff - Proof of Concept Bluetooth Wardriver
BlueSniper Rifle short movie
BlueSpam
Bluetooth - 21C3
Bluetooth - Table of Contents
Bluetooth @ developer.axis.com
Bluetooth and Linux
Bluetooth Applications in New Media Technology
Bluetooth attack N6310i - SET610 - TelecomVergelijker.nl
Bluetooth attack vector for mobile phones
Bluetooth chews on future plans Tech News on ZDNet
Bluetooth chews on future plans _ Tech News on ZDNet
Bluetooth Development Kits
bluetooth device security database btdsd
Bluetooth dongle modification
Bluetooth Encryption Engine
Bluetooth Group Outlines Strategy
Bluetooth Hacking 21c3 slides
BlueTooth Hacking Step by Step Guide News
Bluetooth Mobile9 News
Bluetooth on XP
Bluetooth phone book dumper (Linux BlueZ)
Bluetooth phone hacking tools spreading quickly News
Bluetooth phones at risk from 'snarfing' - ZDNet UK News
Bluetooth Protocol and Security Architecture Review par Korak Dasgupta, University of Tennessee
Bluetooth Scare a Load of Hooey
Bluetooth Security and Attacks Sil Janssens
Bluetooth security guidelines
Bluetooth Security Helger Lipmaa
Bluetooth Security Shot Away
Bluetooth Security
Bluetooth Security_ Preliminary Study [HTML]
Bluetooth server blog
Bluetooth sockets
Bluetooth Stack introduction
Bluetooth Tutorial - Start
Bluetooth Tutorial Palowireless
Bluetooth Vulnerabilities Fact and Fiction WiCon 2004
Bluetooth Wireless - Help - Wireless Security
Bluetooth- Security - MCyclopedia of New Media
Bluetooth- Security - M_Cyclopedia of New Media
Bluetooth.org - The Official Bluetooth Membership Site
Bluewire - Graphical user interface for BlueZ
BlueZ - Official Linux Bluetooth protocol stack
BlueZ Bluetooth stack
Bookpool Bluetooth Security
Brainboxes BlueTooth hardware and Linux
Brainboxes Teams With Ingenico
Broadcom(R) Upgrades Market Leading WIDCOMM(R) Bluetooth(R) Software With Enhanced Security, CD-Like Wireless Stereo Sound and
Broadcom(R) Upgrades Market Leading WIDCOMM(R) Bluetooth(R) Software With Enhanced Security, CD
BTClass
btdsd bluetooth device security database
Building a BlueSniper Rifle
Chicago Tribune After years of promise, Bluetooth hits its stride
Chicago Tribune _ After years of promise, Bluetooth hits its stride
CIO Unencumbered and Insecure
CIO _ Unencumbered and Insecure
Computerworld Bluetooth and ZigBee Their similarities and differences
Cryptanalysis of the Bluetooth Stream Cipher, C. De Canni?
Daily Wireless Wireless News, Research, Insight, and Analysis - 'BlueSnarfing' Revisited
Daily Wireless Wireless News, Research, Insight, and Analysis - Many Wireless Devices Vulnerabl
Daily Wireless Wireless News, Research, Insight, and Analysis - Many Wireless Devices Vulnerable to 'Bluesnarf' attack
deseretnews.com High-tech delights have Achilles' heel security
Digital Munition
Direct Sequence vs. Frequency Hopping
Documento senza titolo
E2X Gear - Extract 2 Transmit
EE206A Home Page (Spring 2002)
Embedded.com - 802.11b is dead - long live Bluetooth
Ericsson Halts Bluetooth Development
Expert Gaps still pain Bluetooth security Tech News on ZDNet
F-Secure Computer Virus Information Pages Skulls.B
Flaws in Digital Wireless Technology Said to Allow Eavesdropping
floAt's Mobile Agent Online
Free Nokia Cellular Phones Bluetooth hack
Full-Disclosure_ [Full-disclosure] DMA[2005-0401a] - 'IVT BlueSoleil Directory Transversal'
FullDisclosure Re Bluesnarf attacks
FullDisclosure_ Re_ Bluesnarf attacks
Geek.com Geek News - BlueSnarfing why you might want to turn off BT when not in use
Gizmodo IMterview With Bluetooth Hacking Flexilis's John Hering
GNOME Bluetooth Subsystem
Group Awareness in Bluetooth
Hackers can attack Bluetooth devices (phoneArena)
Hardware Implementation of Bluetooth Security
HID implementation for the BlueZ stack
Holtmann Organization
Howstuffworks How Bluetooth Works
httpwww.esat.kuleuven.ac.be~jlanostreamdesigns.htm#e0
http___trifinite.org_Downloads_21c3_Bluetooth_Hacking.pdf
http___trifinite.org_trifinite_stuff_blooover.html
http___www.alighieri.org_tools_bluesnarfer.tar.gz
http___www.alighieri.org_tools_bluetooth.tar.gz
http___www.esat.kuleuven.ac.be_~jlano_stream_designs.htm#e0
ICAT Metabase A CVE Based Vulnerability Database
Impronto RoCoCo
Index of -btdsd-download
Information Security News Desk
InformationWeek Bluetooth Security Bluetooth Handy, But Worrisome december 6, 2004
Inside Bay Area - Alameda Times-Star - HOME PAGE
java.net Getting Started with Java and Bluetooth
Jons Guides Bluetooth Help Guide Introduction
Klings.NoWires() - J2ME and Bluetooth
Linksys USBBT100 - Bluetooth USB Adapter
Linux driver for the 3Com Bluetooth PCMCIA card
Man-In-The-Middle Attack Using Bluetooth In A WLAN Interworking Environnment
MeetingPoint - Downloads
Mike Price McAfee soft
Mobile & Wireless Advisor Bluetooth Why Invisible Is Dangerous -- ReefEdge Mobile Domain Certi
Mobile & Wireless Advisor Bluetooth Why Invisible Is Dangerous -- ReefEdge Mobile Domain Certicom movianVPN Business Techno
Mobile & Wireless Advisor Bluetooth Why Invisible Is Dangerous -- ReefEdge Mobile Domain C
Mobile Trojan launches Skulls attack Tech News on ZDNet
MobiLuck Bluetooth software
Motorola partners with sunglasses-maker Oakley Tech News on ZDNet
Motorola partners with sunglasses-maker Oakley _ Tech News on ZDNet
Multiple radios boggle cell phone design
Nederlandse Pocket PC-club
nfc-forum.org
Nicolas Sklavos Homepage
Nokia 6310i Phones Can Be Reset By Remote Users Sending Malformed OBEX Packets Via Bluetooth
Nokia admits multiple Bluetooth security holes - ZDNet UK News
Nokia announced a firmware upgrade for their vulnerable models
Nokia releases 'invisible' Bluetooth security fix - ZDNet UK News
Nokia6310i.txt
OpenOBEX Overview
Overview of the Bluetooth attacking tools I found on the internet [HTML]
palowireless Wireless Resource Center
Pentest Limited - Specialists in security and Oracle
Pervasive Computing with Bluetooth
Ping of Death
Presentation after my internship (dutch) [PPT]
Prevent Wardriving Paint Your Building - Open Source Web Development
Prevent Wardriving_ Paint Your Building - Open Source Web Development
Pulling for Bluetooth
Rambling comments... Bluetooth on XP
Reliability and Noise Immunity in Bluetooth
Report of my internship [HTML]
Roadmap boosts Bluetooth bandwidth
RSA Security - 2.1.5 What is a stream cipher_
Seattle Post-Intelligencer As cell phones get stronger and complicated, are viruses a threat
Secunia - Advisories - WIDCOMM Bluetooth Connectivity Software Buffer Overflow Vulnerabilities
Securing your Bluetooth devices - Computerworld
Security Cavities Ail Bluetooth - Wired News
Security in Bluetooth An overview of Bluetooth security
Security Weaknesses in Bluetooth
SecurityFocus HOME News Bluetooth is attack vector for mobile phones
SecurityFocus HOME News Security Researchers Nibble at Bluetooth
Service Discovery in Bluetooth
Setting up a Bluetooth Packet Transport Link
SMan Renegade's Ericsson Mobile Phone Site
SMOWireless Update 0305
SMO_Wireless Update 03_05
SonyEricssonT610.txt
Source Code for Cabir Cell Phone Worm Released
SRS Software Requirement Specification[HTML]
SSC - Linux - Bluetooth
Study Bluetooth security should raise red flags - Computerworld
Symantec Security Response - SymbOS.Cabir
Technology News Security New Worm Attacks Mobile Phones with Symbian OS
Technology News Technology Bluetooth Security Threat Starting To Spread
Technology News_ Security_ New Worm Attacks Mobile Phones with Symbian OS
Technology News_ Technology_ Bluetooth Security Threat Starting To Spread
The benefits of Bluetooth - vnunet.com
The Bluetooth Location Tracker Project Main
The Bunker
The Death of Bluetooth Intel Moves to Ultrawideband
The first mobile phone worm - Cabir
The role of Bluetooth technology in transforming the value network ...
The Wireless Short List - Popular Science
This Time, Cell Phone Virus Is for Real
Tik-111.550 Bluetooth
TKK - TKO - Tik-86.174 Seminar on Human-Computer Interaction L
Tom's Hardware Guide Business Reports Defcon 12's Fear and Hacking in Vegas - Bluetooth Vulnera
Tom's Hardware Guide Business Reports Defcon 12's Fear and Hacking in Vegas - Bluetooth Vulnerabilities
TomsNetworking
trifinite album
trifinite.blog - the weblog of the trifinite.group
trifinite.download
trifinite.org - the home of the trifinite.group
Trojan gets the cell phone message Tech News on ZDNet
Trojan gets the cell phone message _ Tech News on ZDNet
UNrooted.net Hacker Area
Using GSM-UMTS for Single Sign-On
Viruses, anti-viruses, events, facts and commentary
Vulnerability in Bluetooth Explained
War Nibbling Bluetooth Insecurity
What is bluesnarfing - a definition from the leading computer technical encyclopedia, dictionar
What is bluesnarfing - a definition from the leading computer technical encyclopedia, dictionary and glossary
What is frequency-hopping spread spectrum - a definition from the leading computer technical en
What is frequency-hopping spread spectrum - a definition from the leading computer technical encyclopedia, dictionary and gloss
Wi-Fi Networking News Bluetooth to Made Vaguely Faster, Harder to Use
WIDCOMM Bluetooth Connectivity Solutions
Widcomm BTW (Microsoft Windows BT stack) Directory Transversal
Will Bluetooth Change the Windows GUI
Wired News Security Cavities Ail Bluetooth
Wireless Application Programming with J2ME and Bluetooth
Wireless Handheld Security Articles - Bluefire Security Technologies
Xonio - 23 Handys im Hacker-Test - „Denial of Service“-Attacke Absturz mitten im Gespräch
Xonio - 23 Handys im Hacker-Test - ?Denial of Service?-Attacke Absturz mitten im Gespr?
Year-old Bluetooth vulnerability invites mobile worm - ZDNet UK News
zigbee.org