«
Expand/Collapse
129 items tagged "bluetooth"
Related tags:
martin herfurt [+],
marcel holtmann [+],
mac [+],
chaos communication congress [+],
adam laurie marcel holtmann [+],
tar gz [+],
information disclosure vulnerability [+],
digital [+],
sig [+],
mac address list [+],
harald scan [+],
device [+],
arduino [+],
usa [+],
slides [+],
control [+],
cellphones [+],
bluetooth adapter [+],
black hat [+],
tool [+],
salzburg [+],
phone [+],
motorola models [+],
monitoring systems [+],
michael ossmann [+],
marcel [+],
local privilege escalation [+],
industry [+],
headset [+],
hacking [+],
classic [+],
car [+],
bluefog [+],
adam laurie [+],
adam [+],
hacks [+],
video [+],
spill [+],
smells [+],
security infrastructure [+],
security [+],
privilege escalation vulnerability [+],
new [+],
mark steward tags [+],
mark steward [+],
lindell [+],
hack [+],
dominic spill [+],
dominic [+],
controller [+],
bored [+],
bluetooth headphones [+],
bluetooth communications [+],
authors [+],
attack [+],
art [+],
andrew lindell [+],
Wireless [+],
BackTrack [+],
bluetooth devices [+],
survey tool [+],
bluelog [+],
wireless mice [+],
wireless keyboards [+],
ubertooth [+],
thierry zoller [+],
sures [+],
source release [+],
smartphone [+],
root shell [+],
robots [+],
python [+],
project [+],
paradigm shift [+],
module [+],
mac osx [+],
linux 64bit [+],
layer [+],
kit [+],
keyboard [+],
kevin finistere [+],
home [+],
hat hacker [+],
general. it [+],
full disclosure [+],
enabled [+],
ebay [+],
dslr [+],
bluetooth headset [+],
bluetooth enabled mobile phones [+],
adam laurie tags [+],
site survey [+],
scanner [+],
ytai [+],
year [+],
wristwatch [+],
work [+],
wirelessly [+],
wireless music [+],
wireless input [+],
wireless headset [+],
wireless headphones [+],
windows [+],
wifi [+],
widcomm bluetooth [+],
widcomm [+],
white balance [+],
watch [+],
warranties [+],
vulnerability [+],
video description [+],
version [+],
usb [+],
update [+],
turn [+],
ts magna [+],
travis goodspeed [+],
translator james [+],
translator [+],
toyota matrix [+],
toyota [+],
tomy omnibot [+],
tomy [+],
title [+],
timer function [+],
timer [+],
tim [+],
thunderous roar [+],
thrift store [+],
thrift [+],
thomas [+],
texas [+],
terminal [+],
target hardware [+],
tape deck controls [+],
tags [+],
super nintendo [+],
super [+],
suit [+],
stock stereo [+],
spot [+],
spent three [+],
sparkfun [+],
space heater [+],
snes [+],
sketch [+],
sip [+],
shutter speed [+],
serioux [+],
serial terminal [+],
s communications [+],
ryan [+],
robot controller [+],
robot [+],
rob [+],
roar [+],
rig [+],
rifle [+],
rich [+],
reverse engineering [+],
radio [+],
rachel [+],
r c tank [+],
quot [+],
prototyping [+],
project comes from [+],
programmer [+],
processing [+],
privilege [+],
pringles [+],
premission [+],
pre [+],
power sockets [+],
power [+],
point [+],
playing games [+],
photo frame [+],
photo booth [+],
phik [+],
peter brinkman [+],
personal area network [+],
peripherals [+],
perfect thing [+],
passersby [+],
parts [+],
paper [+],
panda [+],
pair [+],
ossman [+],
oscar [+],
open [+],
one of those guys [+],
omnibot [+],
noise [+],
nintendo controller [+],
nintendo 64 controller [+],
nintendo [+],
network input [+],
netgraph [+],
nes [+],
nathan [+],
n64 controller [+],
musical [+],
music collections [+],
motorola dc800 [+],
motorola [+],
morse code [+],
morse [+],
model ms [+],
mobile internet devices [+],
mobile [+],
missing fingers [+],
mike [+],
midi [+],
microsoft windows [+],
microsoft [+],
microphone [+],
microcontrollers [+],
microcontroller project [+],
microcontroller board [+],
michael ossman [+],
merloni [+],
medical [+],
matt [+],
matrix [+],
mathieu [+],
mains power [+],
mac pin [+],
luca [+],
long range [+],
led [+],
lcd screen [+],
lcd display [+],
kindle [+],
kind [+],
john [+],
jittering [+],
jensen [+],
jared [+],
james [+],
iphone [+],
ioio [+],
interface midi [+],
instructable [+],
infrared heater [+],
improving [+],
hexapod [+],
heater [+],
hardware platform [+],
handset [+],
handhelds [+],
guitar tuner [+],
goodspeed [+],
god [+],
gap [+],
games [+],
game pad [+],
full [+],
freebsd [+],
forgotten gods [+],
fob [+],
flack [+],
finland [+],
finishing touches [+],
fingerless gloves [+],
fifty dollars [+],
fifty [+],
expensive toys [+],
example [+],
entertainment [+],
eeg [+],
echo on [+],
dustin evans [+],
driver version [+],
driver [+],
dr. nick [+],
dr nick [+],
doragasu [+],
donor vehicle [+],
docking system [+],
dna finland [+],
diy [+],
direct [+],
defense [+],
default device [+],
dan [+],
customizable messages [+],
controlling [+],
compatible keyboard [+],
code execution [+],
code [+],
claudio merloni [+],
chronos [+],
chris [+],
chicken [+],
chet [+],
category [+],
cassette adapter [+],
cassette [+],
business [+],
builder hardware [+],
bt4 [+],
bruce potter [+],
broadcom [+],
breathalyzer [+],
brain wave [+],
brain [+],
box [+],
bot [+],
boombox [+],
bogdan [+],
bob [+],
board sensors [+],
board [+],
bluetoothdialup [+],
bluetooth sniffer [+],
bluetooth module [+],
bluetooth headset adapter [+],
bluetooth hacking [+],
bluetooth dongle [+],
bluetooth a2dp profile [+],
bluescripts [+],
bluebag [+],
battery life [+],
battery [+],
automation tool [+],
audio playback [+],
arcade controller [+],
application [+],
androcade [+],
amazon kindle [+],
adapter [+],
accessory kit [+],
access [+],
abi [+],
aaron [+],
Support [+],
General [+],
Final [+],
audio [+],
tar [+],
linux kernel [+],
linux [+],
kernel [+],
android [+]
-
-
10:04
»
Packet Storm Security Recent Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
10:04
»
Packet Storm Security Recent Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
10:04
»
Packet Storm Security Tools
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
10:04
»
Packet Storm Security Tools
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
10:04
»
Packet Storm Security Misc. Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
10:04
»
Packet Storm Security Misc. Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
7:01
»
Hack a Day
[Bogdan] received this set of Serioux Panda speakers as a gift. I turns out that they sound very good and he decided to make them more useful to him by converting them to work as Bluetooth speakers. To begin with he bought the cheapest A2DP device he could find. This is the protocol that identifies [...]
-
-
12:42
»
Packet Storm Security Recent Files
Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.
-
12:42
»
Packet Storm Security Tools
Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.
-
12:42
»
Packet Storm Security Tools
Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.
-
12:42
»
Packet Storm Security Misc. Files
Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.
-
-
16:00
»
SecuriTeam
Broadcom WIDCOMM Bluetooth is prone to a local privilege-escalation vulnerability.
-
-
8:01
»
Hack a Day
Just the other day we were reading a Reddit thread asking about how to control a television with a smartphone. The conversation started by talking about adding an IR LED to the phone. Then it was suggested that there should be standalone Bluetooth devices that convert commands to IR, and came around to the ideas [...]
-
-
21:49
»
SecDocs
Authors:
Adam Laurie Marcel Holtmann Martin Herfurt Tags:
bluetooth Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Bluesnarfing, bluebugging and backdooring have been in the spotlight for over a year now, and, finally, the mobile phone industry have reacted and are issuing fixes for these very serious problems. Accordingly, the time has come for full disclosure... In November 2003, Adam discovered serious flaws in the authentication and data transfer mechanisms on some bluetooth enabled devices, and, in particular, mobile phones including commonly used Nokia, Sony Ericsson and Motorola models. Shortly thereafter, Martin Herfurt of Salzburg Research Forschungsgesellschaft mbH expanded on these problems, and teamed up with Adam to investigate further. At EuroFoo in August 2004, Adam and Marcel Holtmann met, and agreed to colaborate on looking into the underlying causes of the problems, as well as sharing information and resources to try and gain a better foothold for the opensource community within the official bluetooth organistaions. This talk will cover the issues arising out of the flaws, including loss of personal data, identity theft, phone tapping, tracking, fraud and theft of service. The threat to individuals and corporates will be examined, and statistics and examples from the real world presented, as well as live demonstrations and full disclosure of techniques used in each of the attacks. Details of how the industry reacted, what they did, didn't and should have done will also be discussed, as well as some positive steps that have been taken as a direct result of the original problem disclosures. This will be a fun talk and a real eye-opener for those with bluetooth enabled devices, and will start with an introduction into the Bluetooth architecture and the security mechanisms offered by it so that it is possible to understand how and why the different attacks are working. Further there will be an introduction into the Linux Bluetooth stack BlueZ that will be used for doing the attacks and showing exactly how these attacks are working.
-
21:49
»
SecDocs
Authors:
Adam Laurie Marcel Holtmann Martin Herfurt Tags:
bluetooth Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Bluesnarfing, bluebugging and backdooring have been in the spotlight for over a year now, and, finally, the mobile phone industry have reacted and are issuing fixes for these very serious problems. Accordingly, the time has come for full disclosure... In November 2003, Adam discovered serious flaws in the authentication and data transfer mechanisms on some bluetooth enabled devices, and, in particular, mobile phones including commonly used Nokia, Sony Ericsson and Motorola models. Shortly thereafter, Martin Herfurt of Salzburg Research Forschungsgesellschaft mbH expanded on these problems, and teamed up with Adam to investigate further. At EuroFoo in August 2004, Adam and Marcel Holtmann met, and agreed to colaborate on looking into the underlying causes of the problems, as well as sharing information and resources to try and gain a better foothold for the opensource community within the official bluetooth organistaions. This talk will cover the issues arising out of the flaws, including loss of personal data, identity theft, phone tapping, tracking, fraud and theft of service. The threat to individuals and corporates will be examined, and statistics and examples from the real world presented, as well as live demonstrations and full disclosure of techniques used in each of the attacks. Details of how the industry reacted, what they did, didn't and should have done will also be discussed, as well as some positive steps that have been taken as a direct result of the original problem disclosures. This will be a fun talk and a real eye-opener for those with bluetooth enabled devices, and will start with an introduction into the Bluetooth architecture and the security mechanisms offered by it so that it is possible to understand how and why the different attacks are working. Further there will be an introduction into the Linux Bluetooth stack BlueZ that will be used for doing the attacks and showing exactly how these attacks are working.
-
21:49
»
SecDocs
Authors:
Adam Laurie Marcel Holtmann Martin Herfurt Tags:
bluetooth Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Bluesnarfing, bluebugging and backdooring have been in the spotlight for over a year now, and, finally, the mobile phone industry have reacted and are issuing fixes for these very serious problems. Accordingly, the time has come for full disclosure... In November 2003, Adam discovered serious flaws in the authentication and data transfer mechanisms on some bluetooth enabled devices, and, in particular, mobile phones including commonly used Nokia, Sony Ericsson and Motorola models. Shortly thereafter, Martin Herfurt of Salzburg Research Forschungsgesellschaft mbH expanded on these problems, and teamed up with Adam to investigate further. At EuroFoo in August 2004, Adam and Marcel Holtmann met, and agreed to colaborate on looking into the underlying causes of the problems, as well as sharing information and resources to try and gain a better foothold for the opensource community within the official bluetooth organistaions. This talk will cover the issues arising out of the flaws, including loss of personal data, identity theft, phone tapping, tracking, fraud and theft of service. The threat to individuals and corporates will be examined, and statistics and examples from the real world presented, as well as live demonstrations and full disclosure of techniques used in each of the attacks. Details of how the industry reacted, what they did, didn't and should have done will also be discussed, as well as some positive steps that have been taken as a direct result of the original problem disclosures. This will be a fun talk and a real eye-opener for those with bluetooth enabled devices, and will start with an introduction into the Bluetooth architecture and the security mechanisms offered by it so that it is possible to understand how and why the different attacks are working. Further there will be an introduction into the Linux Bluetooth stack BlueZ that will be used for doing the attacks and showing exactly how these attacks are working.
-
-
21:46
»
SecDocs
Authors:
Adam Laurie Marcel Holtmann Martin Herfurt Tags:
bluetooth Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Bluesnarfing, bluebugging and backdooring have been in the spotlight for over a year now, and, finally, the mobile phone industry have reacted and are issuing fixes for these very serious problems. Accordingly, the time has come for full disclosure... In November 2003, Adam discovered serious flaws in the authentication and data transfer mechanisms on some bluetooth enabled devices, and, in particular, mobile phones including commonly used Nokia, Sony Ericsson and Motorola models. Shortly thereafter, Martin Herfurt of Salzburg Research Forschungsgesellschaft mbH expanded on these problems, and teamed up with Adam to investigate further. At EuroFoo in August 2004, Adam and Marcel Holtmann met, and agreed to colaborate on looking into the underlying causes of the problems, as well as sharing information and resources to try and gain a better foothold for the opensource community within the official bluetooth organistaions. This talk will cover the issues arising out of the flaws, including loss of personal data, identity theft, phone tapping, tracking, fraud and theft of service. The threat to individuals and corporates will be examined, and statistics and examples from the real world presented, as well as live demonstrations and full disclosure of techniques used in each of the attacks. Details of how the industry reacted, what they did, didn't and should have done will also be discussed, as well as some positive steps that have been taken as a direct result of the original problem disclosures. This will be a fun talk and a real eye-opener for those with bluetooth enabled devices, and will start with an introduction into the Bluetooth architecture and the security mechanisms offered by it so that it is possible to understand how and why the different attacks are working. Further there will be an introduction into the Linux Bluetooth stack BlueZ that will be used for doing the attacks and showing exactly how these attacks are working.
-
-
8:41
»
SecDocs
Authors:
Adam Laurie Marcel Holtmann Martin Herfurt Tags:
bluetooth Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This talk will provide an overview of all currently know Bluetooth exploits, as well as live demonstrations, including Bluebugging, Snarfing, Dumping, PIN cracking and Car Whispering. Since the last trifinite group presentation at 21C3 a lot has happened in the Bluetooth hacking world. New vulnerabilities have come to light, including some that, unlike previous issues, attack the Bluetooth fundamentals themselves, such as pairing and cryptography. In addition to these, other new attacks such as BlueSmack, BlueSnarf++, BlueBump and Car Whisperer have been developed. In the rapidly expanding world of Bluetooth, it seems the opportunities for mischief abound, and this is a target rich environment for the White and Black Hat hacker alike. In this talk we will present live demonstations of tools such as Car Whisperer, which allows an attacker to connect to vehicle car kits and listen in to conversations via the microphone, and/or inject sound into the car speakers... Provide your own useful traffic bulletins! How often have you wanted to reach out and pass your compliments on the excellent manouver the guy in front of you just made? Now you can do all of that and more... In May, 2005 Shaked & Wool published a theoretical attack on the Bluetooth pairing process. In this talk we will show that the theory is a reality, and present the combined techniques of BlueDumping, BlueSpooofing and PIN cracking, leading to the all-new eavesdropping attack dubbed BlueDropping. This is a brand new attack, never seen in public before, and disclosed for the first time at 22C3. Using this technique, it is possible to monitor and record any and all data and/or voice traffic within a Bluetooth piconet. New tools such as BloooverII will also be released.
-
8:41
»
SecDocs
Authors:
Adam Laurie Marcel Holtmann Martin Herfurt Tags:
bluetooth Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This talk will provide an overview of all currently know Bluetooth exploits, as well as live demonstrations, including Bluebugging, Snarfing, Dumping, PIN cracking and Car Whispering. Since the last trifinite group presentation at 21C3 a lot has happened in the Bluetooth hacking world. New vulnerabilities have come to light, including some that, unlike previous issues, attack the Bluetooth fundamentals themselves, such as pairing and cryptography. In addition to these, other new attacks such as BlueSmack, BlueSnarf++, BlueBump and Car Whisperer have been developed. In the rapidly expanding world of Bluetooth, it seems the opportunities for mischief abound, and this is a target rich environment for the White and Black Hat hacker alike. In this talk we will present live demonstations of tools such as Car Whisperer, which allows an attacker to connect to vehicle car kits and listen in to conversations via the microphone, and/or inject sound into the car speakers... Provide your own useful traffic bulletins! How often have you wanted to reach out and pass your compliments on the excellent manouver the guy in front of you just made? Now you can do all of that and more... In May, 2005 Shaked & Wool published a theoretical attack on the Bluetooth pairing process. In this talk we will show that the theory is a reality, and present the combined techniques of BlueDumping, BlueSpooofing and PIN cracking, leading to the all-new eavesdropping attack dubbed BlueDropping. This is a brand new attack, never seen in public before, and disclosed for the first time at 22C3. Using this technique, it is possible to monitor and record any and all data and/or voice traffic within a Bluetooth piconet. New tools such as BloooverII will also be released.
-
8:41
»
SecDocs
Authors:
Adam Laurie Marcel Holtmann Martin Herfurt Tags:
bluetooth Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This talk will provide an overview of all currently know Bluetooth exploits, as well as live demonstrations, including Bluebugging, Snarfing, Dumping, PIN cracking and Car Whispering. Since the last trifinite group presentation at 21C3 a lot has happened in the Bluetooth hacking world. New vulnerabilities have come to light, including some that, unlike previous issues, attack the Bluetooth fundamentals themselves, such as pairing and cryptography. In addition to these, other new attacks such as BlueSmack, BlueSnarf++, BlueBump and Car Whisperer have been developed. In the rapidly expanding world of Bluetooth, it seems the opportunities for mischief abound, and this is a target rich environment for the White and Black Hat hacker alike. In this talk we will present live demonstations of tools such as Car Whisperer, which allows an attacker to connect to vehicle car kits and listen in to conversations via the microphone, and/or inject sound into the car speakers... Provide your own useful traffic bulletins! How often have you wanted to reach out and pass your compliments on the excellent manouver the guy in front of you just made? Now you can do all of that and more... In May, 2005 Shaked & Wool published a theoretical attack on the Bluetooth pairing process. In this talk we will show that the theory is a reality, and present the combined techniques of BlueDumping, BlueSpooofing and PIN cracking, leading to the all-new eavesdropping attack dubbed BlueDropping. This is a brand new attack, never seen in public before, and disclosed for the first time at 22C3. Using this technique, it is possible to monitor and record any and all data and/or voice traffic within a Bluetooth piconet. New tools such as BloooverII will also be released.
-
-
7:00
»
Hack a Day
[Chet] is showing off the Bluetooth controller upgrade for this RC car. The donor vehicle is a rather inexpensive Porche which he purchased to make sure he didn’t start hacking up his more expensive toys. He took a bit different route than the IOIO RC truck we saw earlier in the week, but the concept [...]
-
-
11:15
»
Hack a Day
[Mansour] had a ceramic space heater mounted near the ceiling of his room. Since heat rises this is not the best design. He upgraded to an infrared heater which works a lot better, but lacks the timer function he used on the old unit. His solution wasn’t just to add a timer. He ended up [...]
-
4:01
»
Hack a Day
[Tim] drives a 1995 Mitsubishi TS Magna, which is equipped with a less than stellar accessory package he lovingly calls a “poverty pack”. He outfitted his ride with an aftermarket head unit that can support the Bluetooth A2DP profile, provided he buys the ridiculously overpriced kit sold by Pioneer. Reluctant to shell out more money [...]
-
-
21:44
»
SecDocs
Authors:
Kevin Finistere Thierry Zoller Tags:
bluetooth Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Hacking Bluetooth revisited - This talks goes into the depth of Bluetooth security, we'll show attacks on every possible bluetooth layer including Application Layer, lower layers. We'll break the drivers, the implementation, the applications and the _protocol itself_. At the end of this talk we hope we have achieved a Prardigm shift with regards on how you perceive Bluetooth Security in General. It's not only for toys. On the Operational side, we'll go into what risks BT poses for your company, why your policies fail and why your current Security Layers aren't enough. Hacking Bluetooth revisited - Kevin Finistere & Thierry Zoller This talk aims at producing a complete paradigm shift on how you perceive Bluetooth security. During the introduction we'll present what Bluetooth is, what has been left out all these years and how to protect yourself. Well digg into Bluetooth Security from Layer 1 up to Layer 7, from the Baseband up to the Application Level. We'll show how to get a Remote Root shell over Bluetooth, during CCC 2006 we'll release BTCrack, Software to crack the Bluetooth Pin/Linkkeys with Man in the Middle attack. We'll show you how to steal link-keys, why the PIN is not that important at all, we'll go into detail how to bypass Bluetooth Security and what the future holds for Bluetooth Security. On the Operational side, we'll go into what risks BT poses for your company, why your policies fail and why your current Security Layers aren't enough. We'll digg into WHY we have arrived there and WHY nobody seemed to care over all these years.
-
21:44
»
SecDocs
Authors:
Kevin Finistere Thierry Zoller Tags:
bluetooth Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Hacking Bluetooth revisited - This talks goes into the depth of Bluetooth security, we'll show attacks on every possible bluetooth layer including Application Layer, lower layers. We'll break the drivers, the implementation, the applications and the _protocol itself_. At the end of this talk we hope we have achieved a Prardigm shift with regards on how you perceive Bluetooth Security in General. It's not only for toys. On the Operational side, we'll go into what risks BT poses for your company, why your policies fail and why your current Security Layers aren't enough. Hacking Bluetooth revisited - Kevin Finistere & Thierry Zoller This talk aims at producing a complete paradigm shift on how you perceive Bluetooth security. During the introduction we'll present what Bluetooth is, what has been left out all these years and how to protect yourself. Well digg into Bluetooth Security from Layer 1 up to Layer 7, from the Baseband up to the Application Level. We'll show how to get a Remote Root shell over Bluetooth, during CCC 2006 we'll release BTCrack, Software to crack the Bluetooth Pin/Linkkeys with Man in the Middle attack. We'll show you how to steal link-keys, why the PIN is not that important at all, we'll go into detail how to bypass Bluetooth Security and what the future holds for Bluetooth Security. On the Operational side, we'll go into what risks BT poses for your company, why your policies fail and why your current Security Layers aren't enough. We'll digg into WHY we have arrived there and WHY nobody seemed to care over all these years.
-
-
12:01
»
Hack a Day
[Rob] has been hard at work designing and building this LED suit which he can wear to parties. He’s got it working, although right now it’s just a pair of pants. It reacts to sound, and has the potential to be controlled from a smartphone via Bluetooth. You’ll find a video description of the build embedded [...]
-
-
11:01
»
Hack a Day
In this project [Ryan] shows how he added Bluetooth audio to the stock stereo of his Toyota Matrix. The work he did with his add-on hardware is quite good. And the installation was surprisingly easy. For example, the dashboard bezel which is hanging in the foreground of this picture simply pulls off without the need [...]
-
-
22:05
»
Packet Storm Security Recent Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
-
4:01
»
Hack a Day
[Chris] has been going about his business, letting his interest guide him as it will. But always in the back of his mind is his Androcade project, and he’s spent the last year making improvements. It’s an arcade controller for playing games on an Android tablet. It connects to the device via Bluetooth, and includes [...]
-
-
11:01
»
Hack a Day
[Dustin Evans] wanted to used his original NES controllers to play emulated games. The problem is he didn’t want to alter the classic hardware. His solution was to use the connectors and enclosure from a dead NES to build a Bluetooth translator that works with any NES controller. Here he’s showing the gutted half of [...]
-
-
14:01
»
Hack a Day
[DJ Sures], mastermind behind the EZ-B Bluetooth Robot controller, sent in a really interesting build where he controls a robot with a 1983 TRS-80 computer. The robot in question is [DJ Sures]‘ adorable WALL-E we’ve seen before. WALL-E is controlled through a Bluetooth connection to a desktop PC with the EZ-Builder hardware and software package. To get the [...]
-
-
20:19
»
Packet Storm Security Recent Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
20:19
»
Packet Storm Security Tools
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
20:19
»
Packet Storm Security Misc. Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
-
13:01
»
Hack a Day
[Mike] dropped us a tip to show off a system he has built to control some power sockets based on his proximity. Initially the project started as a parallel port controlled box to switch the mains power. Then he got the idea of turning this into a little more interactive of an automation tool. He [...]
-
-
9:01
»
Hack a Day
[doragasu]‘s wife is always misplacing her keys. To solve this problem, [doragasu] created a small Bluetooth-enabled key fob that is able to remotely sound an alarm when commanded to by a cell phone. The case and LiPo battery of [doragasu]‘s project comes from a small photo frame key fob. The LCD display and PCB of [...]
-
-
10:01
»
Hack a Day
We’re rather impressed with the work [Aaron] did to add Bluetooth connectivity to his 2008 Honda. He used an aftermarket kit, but rolled in his own revisions to make it look and feel like an original feature. After being disappointed by an expensive docking system he grabbed a Jensen BT360 kit for about $35. It [...]
-
-
7:01
»
Hack a Day
Whether you’d like to do some real-time logging of data, or just want to control a project with your Android phone, [Thomas]‘s Arduino-Android Bluetooth connection instructable is sure to be useful [Thomas]‘ build uses the very inexpensive JY-MCU Bluetooth module that’s available on eBay or dealextreme. This Bluetooth module ties directly into the Tx and Rx [...]
-
-
18:36
»
Packet Storm Security Recent Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
18:36
»
Packet Storm Security Tools
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
18:36
»
Packet Storm Security Misc. Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
-
15:44
»
Hack a Day
[Dan] had been wanting a pair of Bluetooth headphones for quite a while. Most of the reviews for wireless headphones in the $50-$80 range complained of tinny sound and dropped bass. Nevertheless, he stumbled upon a $20 pair of headphones with similar reviews and realized that he could switch out the driver and make a decent [...]
-
-
19:49
»
Packet Storm Security Recent Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
19:49
»
Packet Storm Security Tools
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
19:49
»
Packet Storm Security Misc. Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
-
13:01
»
Hack a Day
Here’s a nifty programmer for a cheap Bluetooth module. So just how cheap is this part? Does $6.60 sound like an extreme deal? The information on this hack is spread throughout a series of posts. The link above goes to the completed programmer (kind of a look back on the hack). But you might start [...]
-
-
8:42
»
Packet Storm Security Recent Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
8:42
»
Packet Storm Security Tools
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
8:42
»
Packet Storm Security Misc. Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
-
11:13
»
Hack a Day
[Travis Goodspeed] wrote in to tell us about his work reverse engineering the Bluetooth communications on this SPOT module. He’s targeted the post as a general guide to sniffing Bluetooth transmissions, but was inspired to use the SPOT as an example after seeing this other SPOT hack. We know he’s a fan of getting things [...]
-
-
5:01
»
Hack a Day
[Al] at Open Gadgets just put the finishing touches on his Android breathalyzer. It’s the perfect thing to install on ex-girlfriends’ phones to prevent 2 a.m. drunk dialing. The project started off as a talking breathalyzer connected to a computer that tweeted your BAC, gave weather and stock readouts, and functioned as a photo booth. [...]
-
-
11:01
»
Hack a Day
[Ytai], the lead developer for the IOIO breakout board for the Android Open Accessory kit, figured out how to control just about anything from an Android phone wirelessly over Bluetooth. When [Ytai] first announced the IOIO breakout board for Android devices, one of the commentors on his post said a standard Bluetooth dongle could stand [...]
-
-
12:04
»
Hack a Day
[James] is one of those guys on a quest to control everything with one device. His tool of choice is an Android phone, which can do quite a lot right out of the box. But he was never satisfied with its lack of IR remote control abilities. He fixed that feature-gap by building a Bluetooth [...]
-
-
14:01
»
Hack a Day
[Oscar] shows us how to use a Processing sketch for Android to communicate with Bluetooth devices (translated). It turns out this is easier than you might think. Processing and Android are both closely related to Java, and you can just import the Android libraries that deal with Bluetooth within the Processing sketch. That makes it easy to enable [...]
-
-
13:05
»
Hack a Day
[Rich's] newest version of a Bluetooth connected Super Nintendo controller takes what was already good and makes it better. We looked at the original version back in May, which is built into a knockoff controller – [Rich] mentions that he got a lot of flack for defacing retro equipment and wants to set the record [...]
-
7:04
»
Hack a Day
Today, with iPods that can hold entire music collections and cell phones that stream music from the Internet, the lowly cassette seems like an anachronism. [Matt] still has a cassette deck in his truck, but wanted Bluetooth connectivity for his stereo. The obvious solution was to stuff Bluetooth headphones into a cassette adapter. Audio cassette [...]
-
-
8:01
»
Hack a Day
[Manishi] wrote in to share his latest project, a Bluetooth DSLR controller that works with Android. More than a mere Bluetooth shutter trigger, his device lets you control a wide array of other settings such as aperture, shutter speed, ISO, white balance, focus position and live view. His “YaNis” control system was built using an [...]
-
-
8:01
»
Hack a Day
This bluetooth headset hack, although simple, may provide some hacking inspiration. Turning a Bluetooth headset into a wireless input for one’s stereo is definitely something that makes one think “why didn’t I think of that?” It’s also good if you’ve got a tight hacking budget as there’s not a lot of stuff to buy. In [...]
-
-
10:01
»
Hack a Day
We hate to admit it, but we missed out on the TI Chronos watch deal last week. While we’re still a little bit burned over the fact that these watches sold out so fast, [Ahmet] sent in his Open Source Bluetooth Watch and we’re thinking this could eventually be a decent replacement. The watch is [...]
-
-
11:01
»
Hack a Day
For decades a thunderous roar rose from the bowels of IBM keyboards like the animus of angry and forgotten gods. These keyboards have fallen silent of late, due only to incompatibility with newer hardware. Now, Model Ms have been given a reprieve from landfills or recycling centers because of the work of [wulax] of geekhack and his [...]
-
-
6:04
»
Hack a Day
The team a Zunkworks wanted to build a device for people who can’t normally use a keyboard and mouse. The Bluetooth Morse code keyboard is what they came up with. This build gives the user full control over the keyboard and mouse using a single button or a sip & puff interface. The project is [...]
-
-
9:02
»
Hack a Day
[Peter Brinkman] is working on a circuit that makes it easy to interface MIDI and Bluetooth devices. His target hardware has been a MIDI compatible keyboard and an Android phone. He was inspired to tip us off about the project after reading about yesterday’s Bluescripts project. We’ve embedded two demo videos after the break. They [...]
-
-
9:05
»
Hack a Day
Here’s a way to gain control of your projects using an Android device. Bluescripts is a free app available in the Android market that makes it a bit easier to make interfaces to send customizable messages. If you have a Bluetooth receiver in your project, connecting to it is as easy as putting the MAC [...]
-
-
13:56
»
Packet Storm Security Recent Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
13:56
»
Packet Storm Security Tools
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
13:56
»
Packet Storm Security Misc. Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
-
7:40
»
Hack a Day
[Phik] wrote in to share his very first microcontroller project with us. He built a bluetooth remote in an old Nintendo 64 controller to control an audio application on his computer. He had been building up the individual modules with the controller in mind for some time, but initially had no idea what kind of [...]
-
-
15:01
»
Hack a Day
[Kyle] was digging through a box of junk he had lying around when he came across an old USB Bluetooth dongle. He stopped using it ages ago because he was unsatisfied with the limited range of Bluetooth communications. He was going to toss it back into the box when an idea struck him – he [...]
-
-
6:04
»
Hack a Day
[Reginaldo] purchased a cheap Bluetooth headset adapter, and while it worked well with all of his devices, he was disappointed to find that the battery life didn’t quite live up to the manufacturer’s claims. Advertised as capable of operating for 10 hours, he discovered that the device would typically die after only 7. He wanted [...]
-
-
12:01
»
Hack a Day
[John] wrote in to share his latest creation, an Arduino-controlled Bluetooth robot. You might remember him from one of his previous hacks, the Lawnbot 400. This time around, he has decided to scale things down a bit and focus his hacking on small R/C toys. His Bluetooth bot was constructed using a cheap R/C tank [...]
-
-
14:02
»
Hack a Day
[Rachel's] Bluetooth glove is proving that you don’t have to be missing fingers to talk to the hand. You can see in the video after the break that, like us, she wears fingerless gloves while typing to keep the cold from causing pain in her hands (it’s so cold in here it’s like we’re [Bob [...]
-
-
12:01
»
Hack a Day
Here’s a small but functional hexapod that is controlled via Bluetooth. [Sigfpe] started with the hexapod kit sold by Polulu and added a BlueSMiRF modem to get the little guy’s communications up and running. But since the bot is merely three servos, a microcontroller board, sensors, and miscellaneous parts it’s an easy build for most [...]
-
-
9:30
»
Hack a Day
[DJ Sures] sent us his most recent hack, and it’s one that is sure to please those who enjoy a good dose of 80′s nostalgia. He located a Tomy Omnibot on eBay and snatched it up immediately. While he was waiting for it to arrive, he planned out what he would add to it once [...]
-
-
20:50
»
Packet Storm Security Recent Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
20:50
»
Packet Storm Security Tools
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
20:50
»
Packet Storm Security Misc. Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
-
11:00
»
Hack a Day
Ubertooth Zero is the first offering in [Michael Ossman's] quest for a Bluetooth sniffing and hacking hardware platform. We’ve seen some of his hacks in the past, like the build-in guitar tuner and some pink pager fiddling. The Ubertooth dongle is his original design based around an LPC1758 ARM Cortex-M3 processor paired with a Texas [...]
-
-
22:01
»
Packet Storm Security Tools
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique Bluelog Live mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
22:01
»
Packet Storm Security Recent Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique Bluelog Live mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
20:28
»
Packet Storm Security Tools
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
-
15:00
»
Hack a Day
Master EEG hackers [MOG] and [Tim] over at the Makers Local 256 have been working on creating a Bluetooth EEG listener made from a Mattel Mindflex. This build is based on an earlier build of a group called [Frontier Nerds] (thanks for the heads up [Nathan]!), but this version ditches the Arduino in favor of [...]
-
-
15:00
»
Hack a Day
[Mathieu] spent three months developing this multimedia remote control. It connects to a PC via USB or Bluetooth and communicates with Winamp to pull down track information for display on a Nokia LCD screen. It can also be used as a wireless headset via the two on-board jacks. [Mettieu] thinks it’s just a small hop [...]
-
-
8:57
»
Hack a Day
[Jared] often needs to be on conference calls for work during his motorcycle commute. He’s got a bluetooth headset that cancels noise but it didn’t have a mute feature. He cracked open the speaker and microphone portion of the apparatus but there wasn’t enough room for a switch. The base unit which houses the noise [...]
-
-
18:24
»
Packet Storm Security Tools
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique Bluelog Live mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
18:24
»
Packet Storm Security Recent Files
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique Bluelog Live mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
-
-
19:03
»
Packet Storm Security Tools
Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python. This is the Linux 64bit binary release.
-
19:03
»
Packet Storm Security Tools
Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python. This is the Linux 32bit binary release.
-
19:03
»
Packet Storm Security Tools
Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python. This is the Mac OSX source release.
-
19:03
»
Packet Storm Security Recent Files
Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python. This is the Linux 64bit binary release.
-
19:03
»
Packet Storm Security Recent Files
Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python. This is the Linux 32bit binary release.
-
19:02
»
Packet Storm Security Recent Files
Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python. This is the Mac OSX source release.
-
-
18:24
»
Wirevolution
A while back the Wi-Fi Alliance announced a new certification program, Wi-Fi Direct, which enables a PC to connect directly with other Wi-Fi devices without having to go through an Access Point.
The Wi-Fi certification process for Wi-Fi Direct is scheduled to be launched by the end of 2010, but there are already two pre-standard implementations of this concept, My Wi-Fi, an Intel product which ships in Centrino 2 systems, and Wireless Hosted Network which ships in all versions of Windows 7.
The Wi-Fi Direct driver makes a single Wi-Fi adapter on the PC look like two to the operating system: one ordinary one that associates with a regular Access Point, and a second acting as a “Virtual Access Point.” The virtual access point (Microsoft calls it a “SoftAP”) actually runs inside the Wi-Fi driver on the PC (labeled WPAN I/F in the Intel diagram below).

To the outside world the Wi-Fi adapter also looks like two devices, each with its own MAC address: one the PC just like without Wi-Fi Direct, and the other an access point. Devices that associate with that access point join the PC’s PAN (Personal Area Network).
This yields several benefits in various use cases.
I wrote a couple of years ago about how a company called Ozmo planned to use a Wi-Fi PAN to connect peripherals to PCs, replacing Bluetooth and proprietary wireless technologies. That plan has now come to fruition. Earlier this month Ozmo announced that it had received $10.8 million in additional funding, and this week it announced two major customers: Primax, a leading ODM of wireless mice, and NMB Technologies, a leading ODM of wireless keyboards.
Here’s a slide from one of their promotional presentations giving a comparison with Bluetooth and proprietary technologies:

The essence of Ozmo’s approach is low cost, multi-device, low bandwidth and low power consumption. Wi-Fi Direct has another use case that is high bandwidth, with no requirement for low power.
If you want to stream video from your PC to a monitor using traditional Wi-Fi (“infrastructure mode”) each packet goes from the PC to the access point, then from the access point to the TV, so it occupies the spectrum twice for each packet. Wi-Fi Direct effectively doubles the available throughput, since each packet flies through the ether only once, directly from the PC to the TV. But it actually does better than that. Supposing the PC and the TV are in the same room, but the access point is in a different room, the PC can transmit at much lower power. Another similar Wi-Fi Direct session can then happen in another room in the house. Without Wi-Fi direct the two sessions would have to share the access point, taking turns to use the spectrum. So we get increased aggregate throughput both from halving the number of packet transmissions, and from allowing simultaneous use of the spectrum by multiple sessions (if they are far enough apart).
A Wi-Fi buff would point out that you can already do all this with ad-hoc mode, but Wi-Fi Direct purports to be usable by mortals, and to work interoperably, neither of which could be said for ad-hoc mode until recently. In January Infinitec announced a new point-to-point video streaming product that claims to be easy to use and universally interoperable, that Engadget implies uses ad-hoc mode, though Google can’t find the words “ad hoc” on the Infinitec website.
Between the bandwidth extremes of mice and TVs, lie numerous other potential uses, like headsets (which Ozmo also supports); syncing phones, cameras and media players; and wireless printers.
-
-
20:34
»
Wirevolution
ABI came out with a press release last week saying that 770 million Wi-Fi chips will ship in 2010. This is an amazing number. Where are they all going? Fortunately ABI included a bar-chart with this information in the press release. Here it is (click on it for a full-size view):

The y axis isn’t labeled, but the divisions appear to be roughly 200 million units.
This year shows roughly equal shipments going to phones, mobile PCs, and everything else. There is no category of Access Points, so presumably less of those are sold than “pure VoWi-Fi handsets.” I find this surprising, since I expect the category of pure VoWi-Fi handsets to remain moribund. Gigaset, which makes an excellent cordless handset for VoIP, stopped using Wi-Fi and went over to DECT because of its superior characteristics for this application.
There is also no listing for tablet PCs, a category set to boom; they must be subsumed under MIDs (Mobile Internet Devices).
The chart shows the portable music player category growing vigorously through 2015. iPod unit sales were down 8% year on year in 1Q10, and pretty much stagnant since 2007. ABI must be thinking that even with unit sales dropping, the attach rate of Wi-Fi will soar.
The category of “Computer Peripherals” will probably grow faster than ABI seems to anticipate. Wireless keyboards and mice use either Bluetooth or proprietary radios currently, but the new Wi-Fi alliance specification “Wi-Fi Direct” will change that. Ozmo is aiming to use Wi-Fi to improve battery life in mice and keyboards two to three-fold. Since all laptops, most all-in-one PCs and many regular desktops already have Wi-Fi built-in (that’s at least double the Bluetooth attach rate) this may be an attractive proposition for the makers (and purchasers) of wireless mice and keyboards. Booming sales of tablet PCs may further boost sales of wireless keyboards and mice.
-
-
11:00
»
Hack a Day
[Nathan] took this boombox and outfitted it for Bluetooth streaming. He took a Motorola DC800, which is meant to make headphones wireless, and connected it to the stereo inputs. The controls for the Bluetooth module were routed to the stock tape deck controls and a little bit of frosted spray paint adds a blue glow [...]
-
-
7:34
»
Hack a Day
[MODDEDbyBACTERIA] has posted this instructible on how to make a bluetooth SNES controller. The bulk of the parts come from a bluetooth MSI game pad, so this isn’t a scratch build, but the amount of modifications required definitely qualify this as a hack. We were quite surprised that he managed to stuff all of that back into [...]
-
-
6:00
»
Hack a Day
[.ronin] built an all-in-one WiFi and Bluetooth sniffer. He used a Nerf rifle as a base and added two Pringles cantennas, a tablet PC, and other various bits to tie it all together. Now he wanders the streets, explaining the device to bewildered passersby. After showing the device at CarolinaCon 2010 (here’s a PDF of [...]
-
-
9:36
»
remote-exploit & backtrack
my bt4 doesn't recognize my bluetooth driver so i think its not installed already i just want to know how to know my bluetooth driver version so i can download it from net and install it just want to know how to get my bluetooth version ?
-
-
11:26
»
remote-exploit & backtrack
^^Title^^
That would be so awesome.
-- Dr. Nick
-
-
6:02
»
remote-exploit & backtrack
Hello
Could You be so kind and tell me how to make iPhone tethering via Bluetooth on BT4 final?
Regards
Lukanio
-
-
8:03
»
Hack a Day
This is an Amazon Kindle DX with a Sparkfun Bluetooth Mate stuck in it. [Darron] hacked the two together in order to have a wireless serial terminal on the device. There are three big pads in the middle of the Kindle PCB labelled GND, RX and TX, making it easy to figure out those connections. [...]
-
-
6:01
»
remote-exploit & backtrack
How to connect to your phone via Bluetooth to access Internet
by:MWood
this is not 100% foolproof, but works for me.
My provider is DNA Finland, your chatscript line
may be different acording to your service description
Config your files:
/etc/bluetooth
-
edit
rfcomm.conf and
main.conf
/etc/bluetooth/rfcomm.conf
#
# RFCOMM configuration file.
#
rfcomm0 {
# # Automatically bind the device at startup
bind yes;
#
# # Bluetooth address of the device
device 00:26:CC:8A:24:59;
#
# # RFCOMM channel for the connection
channel 1;
#
# # Description of the connection
comment "Dial-Up Networking";
}
/etc/bluetooth/main.conf
[General]
# List of plugins that should not be loaded on bluetoothd startup
#DisablePlugins = network,input
# Default adaper name
# %h - substituted for hostname
# %d - substituted for adapter id
#Name = %h-%d
Name = YOUR_BOX
# Default device class. Only the major and minor device class bits are
# considered
#Class = 0x000100
Class = 0x0a010c
# run "hciconfig hci0 class"
# How long to stay in discoverable mode before going back to non-discoverable
# The value is in seconds. Default is 180, i.e. 3 minutes.
# 0 = disable timer, i.e. stay discoverable forever
DiscoverableTimeout = 0
# Use some other page timeout than the controller default one
# (16384 = 10 seconds)
PageTimeout = 8192
# Behaviour for Adapter.SetProperty("mode", "off")
# Possible values: "DevDown", "NoScan" (default)
OffMode = NoScan
# Discover scheduler interval used in Adapter.DiscoverDevices
# The value is in seconds. Defaults is 0 to use controller scheduler
DiscoverSchedulerInterval = 0
/etc/ppp/peers
-
create a file "BluetoothDialup"
/etc/ppp/peers/BluetoothDialup
debug
noauth
connect "/usr/sbin/chat -v -f /etc/chatscripts/BluetoothDialup"
usepeerdns
/dev/rfcomm0 115200
defaultroute
crtscts
lcp-echo-failure 0
/etc/chatscripts
-
create a file "BluetoothDialup" ( yes the same name as above )
/etc/chatscripts/BluetoothDialup
TIMEOUT 35
ECHO ON
ABORT '\nBUSY\r'
ABORT '\nERROR\r'
ABORT '\nNO ANSWER\r'
ABORT '\nNO CARRIER\r'
ABORT '\nNO DIALTONE\r'
ABORT '\nRINGING\r\n\r\nRINGING\r'
'' \rAT
OK 'AT+CGDCONT=1, "IP", "INTERNET"'
OK ATD*99#
CONNECT ""
note: the line
OK ATD*99# is your dialup number, mine is simply *99#
note: the line
OK 'AT+CGDCONT=1, "IP", "INTERNET"'
is very importaint, especially the "INTERNET" entry, this should
match your phones service. Mine is "dna INTERNET" on my phone, but
the correct info for the script is "INTERNET".
If you get an error about needed to subscribe to blahblah, you got it wrong!
/var/lib/YOUR_BT4_BLUETOOTHDEVICE_MAC/
-
create a file called "pincodes"
enter on one line...
YOUR_PHONES_MAC PIN
/var/lib/YOUR_BT4_BLUETOOTHDEVICE_MAC/pincodes
example:
00:11:22:33:44:55 1234
-
restart the bt daemon...
user@bt~#
/etc/init.d/bluetooth restart
to connect issue the command...
user@bt~#
pon BluetoothDialup
to disconnect issue the command....
user@bt~#
poff BluetoothDialup
problems:
If you have previously paired your phone in windows,
you may need to delete the old pairing,
then repair in BT4. Pairing will be from BT4->Phone
( accecpt request and PIN:1234 )