Bluetooth Hacking: The Most Vulnerable Data Transmission Protocol! (Part 4)

We recently started an exploration into ways to track devices using the Bluetooth protocol. As you know, Bluetooth is a protocol that connects short-range devices such as headphones, speakers, and keyboards. Its minimum range is within a radius of 10 meters (~33 feet) and maximum at 100 meters (~328 feet).

I have already explained the basics of Bluetooth technology in my first article in this series, and I even showed how Elliot used Bluetooth hacking in Mr. Robot. In this article, we will look at using the MultiBlue Dongle.

bl5

The dongle can connect to any Bluetooth device and allow you to use your computer keyboard to control the device. Ostensibly developed and marketed to allow users to use their computer keyboard and mouse on their. As you can imagine, it can be used for more illegal activities. It is available from many retailers, including Amazon.com, for about $35.

In this guide, we will need physics on the device, but as we expand and deepen your knowledge of Bluetooth, we will try to use the dongle to control Bluetooth devices without physical access.

Although Bluetooth is limited to 10-100 meters, this is more than enough to cover most homes, neighborhoods, offices, libraries, schools, coffee shops, etc. With an antenna, this range can be extended. Now let's see how you can connect to an Android device and control it through your computer keyboard.

Human Interface Device

HID, or Human Interface Device, is a protocol for devices that relate directly to humans. This category includes monitors, keyboards and microphones. With the MultiBlue Dongle, we will use the HID protocol to send keyboard and mouse inputs over Bluetooth to our target.

Step 1: Import to your computer

MultiBlue Dongle is developed to work with either Windows or Mac OS X operating systems. In this article, I will use it on a Windows 7 system. If you only use Linux, you can use it with Wine.

MultiBlue doesn't need any driver as everything it needs is installed on the Dongle. The dongle is actually a 4GB stick with Bluetooth capabilities. Simply plug it into any USB port on your computer.

Step 2: Activate MultiBlue

Once you plug the MultiBlue into your system, it will appear just like any other USB flash drive. Click on the MultiBlue icon and a sub-directory will open with two options, Win and Mac. Click Windows

When you do, the MultiBlue app will be activated.

Step 3: Put the device in discovery mode

Now, we need to enable bluetooth on the target device in discovery mode. Android is now in discovery mode for 2 minutes.

Step 4: Pair and get pin

The device will now receive a connection request from MultiBlue. Accept the pairing request. When you do this, the device will present you with a numeric code. You will need to enter this code in the MultiBlue application on your Windows system. As you might have guessed, this numeric code is the pre-agreed one which is crucial for Bluetooth authentication and encryption.

We will see in future articles that we can get this code in various ways (eg sniffing) without having physical access to the phone.

Additionally, notice that the MultiBlue Dongle advertises itself as “MultiBlue Dongle” in the pairing system. We'll see in a later article that we can spoof this name to something that looks safe to the target, like “My iPod” or “My Speakers”, tricking the user into thinking it's their device they want to pair with.

Now we enter the code in the MultiBlue application, as mentioned above.

When we're done, MultiBlue responds and shows us that the device has been paired.

Now, we have both our keyboard and mouse to control our phone or tablet!

Step 5: How to use it

Now that we have control of the device, we can do pretty much anything we want with it (as long as it's within range). One of the things we might want to do is download a mobile spy software that I already showed in this article. Additionally, we may want to open a terminal to run in the background so we can use it (when in range).

Now that we know we can control the device with the MultiBlue Dongle, we will work on being able to do the same thing without physical access and without MultiBlue.

Somewhere here is the series of guides Bluetooth Hacking has reached its end. I hope you enjoyed it, that you got the necessary knowledge about how this type of attack is accomplished and that you don't use this technique to gain access to a device you don't own!

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.
Bluetooth Hacking

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).