Thursday, January 16, 2020

Bluetooth Pentesting guide 101

Just interesting in daily life that we cant see properly called signals that we can't see with our own eyes

but devices can do there many wireless communication are there like

Wireless Communication protocols in IoT:

  1. wifi (wireless fidelity)
  2. bluetooth 
  3. zigbee
  4. zwave 
  5. LoRA
  6. GSM
But let's get into the topic Mostly relevant 

Vulnerabilities in Bluetooth:

  1. Authentication and authorization issues
  2. MiTM
  3. DoS
  4. MAC Spoofing
  5. PIN Cracking
  6. Brute force

In android Bluetooth mostly we will get this type vulnerability:

  1. RCE        Remote code execution
  2. EoP        Elevation of privilege
  3. ID         Information disclosure
  4. DoS        Denial of service

In major level 

  1. Bluetooth chipset vulnerabilities

Well same procedure what we scan the surrounding devices and start attacks from the write-ups available in google


Let’s see little difference right now we need to know how Bluetooth works




Lets start with Required installation tools 


A written bash script for the BLE Pentesting tools to install in a Ubuntu or debian OS 
just download from here

wget https://raw.githubusercontent.com/IoTSecurity101/BLE-UAE/master/ble_uae.sh

And give the permission to run chmod +x ble_uae.sh



./ble_uae.sh


Will install requirement tools with dependencies as well.All good with tools what i need to do just need to understand what to do before we need to start hacking , fuzzing and MiTM on BLE devices

ESP32 - Espressif Device
Smartbnad bought from flipkart - 359 /- Rupees - we can buy from the banggood or any other online sellers

                         

Bluetooth Pentest Guide:

---------------------------------


1. Flashing the codes to ESP32
2. Understanding BLE with Mobile App Configuration
3. Recon Techniques 
4. Finding the Vulnerabilities 
5. Python & easy bash scripts 
6. Cheatsheet




Share:

0 comments:

Post a Comment