Category Archives: Bluetooth Security

Bluetooth Security Forensics Conclusion

Introduction  The Bluetooth Team has been working hard all semester and has finally finished testing with all bluetooth tools. This semester has been challenging for everyone as we learned about Bluetooth and its vulnerabilities. Our team has gained a lot of insight into the realities of modern Bluetooth security, using tools such as Econocom Digital […]

Continue reading

Bluetooth Security Forensics 5.0

Introduction The Generic Attribute Profile (GATT) is the necessary profile that is used to send data between Bluetooth devices. The transfer of data using GATTs has two steps that are repeated to continue sending data. The GATT server is whatever Bluetooth device you are connecting to your host device. The host device is the GATT client. […]

Continue reading
Bluetooth

Bluetooth Security Forensics 4.0

Introduction Since our last update, the Bluetooth team has made progress on hitting our devices with L2ping. We have also received communication from Btlejuice’s creator to help us solve some of the problems we encountered. We learned that Btlejuice is optimized to run using the Google Chrome web browser, so we worked on getting Chrome […]

Continue reading
bluetooth 3.0 banner wireless signal waves

Bluetooth Security Forensics 3.0

Bluetooth Passive Recon Update  The Bluetooth team has completed the recon phase that began at the time of our previous blog post. We successfully enumerated the target devices for Pwnie Express’s BlueHydra; there was some trial and error, but after some hard work we have created the initial foundation we need. The data specifically recorded […]

Continue reading
Bluetooth symbol with program code

Bluetooth Security Forensics 2.0

Bluetooth Recon Phase The Bluetooth team has been using Pwnie Express’s BlueHydra and Econocom Digital Security’s Btlejuice to gather information about the various devices we will be working with throughout the semester. The team collectively decided it was imperative to understand how these tools gather the data they report before we can begin searching for […]

Continue reading
LCDI Apple Watch Moto 360 smartwatch Motorola smartphone bluetooth security

Bluetooth Security Forensics

Bluetooth Security  Lately, the LCDI has been committed to researching the capabilities and vulnerabilities of Bluetooth. More and more consumers are including Bluetooth capable devices in their personal repertoire, and the Bluetooth Special Interest Group continues to expand and update the protocol with the recent release of Bluetooth 5.0. With these factors in mind, the […]

Continue reading
LCDI picture of students working

Bluetooth Vulnerability Assessment 3.0

Analysis On Bluetooth Vulnerability Assessment 3.0 The Bluetooth Team is beginning to wind down and finalize our culminating report, but we have still made tremendous progress since our last blog. Our Btlejuice Team has been able to solve their previous issue with the Schlage Sense Smart Deadbolt, which caused the lock to disappear from the […]

Continue reading
LCDI Leahy Center for Digital Investigation Bluetooth logo and Champlain College logo dark blue background

Bluetooth Vulnerability Assessment 2.0

Bluetooth Vulnerability Assessment 2.0 The Bluetooth Team has been hard at work using the tools previously gathered to assess – and exploit – vulnerabilities in the wireless connectivity protocol. With Pwnie Express’s BlueHydra and Econocom Digital Security’s Btlejuice installed on each of the two team’s  respective laptop, we have begun our analysis of current Bluetooth […]

Continue reading
Bluetooth Security with logo and three monitors at the LCDI

Bluetooth Vulnerability Assessment

Bluetooth Security With popular television shows like CSI Cyber and Mr. Robot showcasing cybercriminals exploiting Bluetooth to gain access to their victims’ devices, Bluetooth security has become increasingly popular in the consumer market. But do you really know how safe you are from Bluetooth attacks?   Analysis Bluetooth is a wireless protocol that works by […]

Continue reading
bluetooth security bluetooth logo

Bluetooth Security Final Blog

Introduction Over the past seven weeks, our team at the Leahy Center for Digital Investigation has been working to discover the inherent vulnerabilities in Bluetooth security technology. We have wrapped up the research portion of our project and have begun running tests on our devices. Over the next several weeks we will continue to run […]

Continue reading