Category Archives: Bluetooth Security

bluetooth

Bluetooth Device Tracking Update 2

Intro In this second blog post we will be delving into the math and code that will calculate our Bluetooth device’s position. We will cover more in detail exactly how our calculations work and the background behind them. We will also address the choices on the values used to perform the calculations. The code has […]

Continue reading

Bluetooth Device Tracking with Trilateration

Overview This project focuses on developing a system that will allow Bluetooth device tracking in a prepared area. We intend to create a set of small, portable units that can be placed in a building to quickly set up a network to monitor Bluetooth signals and calculate a position for said devices. Device Overview The […]

Continue reading

Bluetooth Security Forensics Conclusion

Introduction  The Bluetooth Team has been working hard all semester and has finally finished testing with all bluetooth tools. This semester has been challenging for everyone as we learned about Bluetooth and its vulnerabilities. Our team has gained a lot of insight into the realities of modern Bluetooth security, using tools such as Econocom Digital […]

Continue reading

Bluetooth Security Forensics 5.0

Introduction The Generic Attribute Profile (GATT) is the necessary profile that is used to send data between Bluetooth devices. The transfer of data using GATTs has two steps that are repeated to continue sending data. The GATT server is whatever Bluetooth device you are connecting to your host device. The host device is the GATT client. […]

Continue reading
Bluetooth

Bluetooth Security Forensics 4.0

Introduction Since our last update, the Bluetooth team has made progress on hitting our devices with L2ping. We have also received communication from Btlejuice’s creator to help us solve some of the problems we encountered. We learned that Btlejuice is optimized to run using the Google Chrome web browser, so we worked on getting Chrome […]

Continue reading
bluetooth 3.0 banner wireless signal waves

Bluetooth Security Forensics 3.0

Bluetooth Passive Recon Update  The Bluetooth team has completed the recon phase that began at the time of our previous blog post. We successfully enumerated the target devices for Pwnie Express’s BlueHydra; there was some trial and error, but after some hard work we have created the initial foundation we need. The data specifically recorded […]

Continue reading
Bluetooth symbol with program code

Bluetooth Security Forensics 2.0

Bluetooth Recon Phase The Bluetooth team has been using Pwnie Express’s BlueHydra and Econocom Digital Security’s Btlejuice to gather information about the various devices we will be working with throughout the semester. The team collectively decided it was imperative to understand how these tools gather the data they report before we can begin searching for […]

Continue reading
LCDI Apple Watch Moto 360 smartwatch Motorola smartphone bluetooth security

Bluetooth Security Forensics

Bluetooth Security  Lately, the LCDI has been committed to researching the capabilities and vulnerabilities of Bluetooth. More and more consumers are including Bluetooth capable devices in their personal repertoire, and the Bluetooth Special Interest Group continues to expand and update the protocol with the recent release of Bluetooth 5.0. With these factors in mind, the […]

Continue reading
LCDI picture of students working

Bluetooth Vulnerability Assessment 3.0

Analysis On Bluetooth Vulnerability Assessment 3.0 The Bluetooth Team is beginning to wind down and finalize our culminating report, but we have still made tremendous progress since our last blog. Our Btlejuice Team has been able to solve their previous issue with the Schlage Sense Smart Deadbolt, which caused the lock to disappear from the […]

Continue reading
LCDI Leahy Center for Digital Investigation Bluetooth logo and Champlain College logo dark blue background

Bluetooth Vulnerability Assessment 2.0

Bluetooth Vulnerability Assessment 2.0 The Bluetooth Team has been hard at work using the tools previously gathered to assess – and exploit – vulnerabilities in the wireless connectivity protocol. With Pwnie Express’s BlueHydra and Econocom Digital Security’s Btlejuice installed on each of the two team’s  respective laptop, we have begun our analysis of current Bluetooth […]

Continue reading