Tag Archives: Bluetooth Security

Bluetooth Security Forensics Conclusion

Introduction  The Bluetooth Team has been working hard all semester and has finally finished testing with all bluetooth tools. This semester has been challenging for everyone as we learned about Bluetooth and its vulnerabilities. Our team has gained a lot of insight into the realities of modern Bluetooth security, using tools such as Econocom Digital […]

Continue reading
LCDI Apple Watch Moto 360 smartwatch Motorola smartphone bluetooth security

Bluetooth Security Forensics

Bluetooth Security  Lately, the LCDI has been committed to researching the capabilities and vulnerabilities of Bluetooth. More and more consumers are including Bluetooth capable devices in their personal repertoire, and the Bluetooth Special Interest Group continues to expand and update the protocol with the recent release of Bluetooth 5.0. With these factors in mind, the […]

Continue reading
LCDI Leahy Center for Digital Investigation Bluetooth logo and Champlain College logo dark blue background

Bluetooth Vulnerability Assessment 2.0

Bluetooth Vulnerability Assessment 2.0 The Bluetooth Team has been hard at work using the tools previously gathered to assess – and exploit – vulnerabilities in the wireless connectivity protocol. With Pwnie Express’s BlueHydra and Econocom Digital Security’s Btlejuice installed on each of the two team’s  respective laptop, we have begun our analysis of current Bluetooth […]

Continue reading
Bluetooth Security with logo and three monitors at the LCDI

Bluetooth Vulnerability Assessment

Bluetooth Security With popular television shows like CSI Cyber and Mr. Robot showcasing cybercriminals exploiting Bluetooth to gain access to their victims’ devices, Bluetooth security has become increasingly popular in the consumer market. But do you really know how safe you are from Bluetooth attacks?   Analysis Bluetooth is a wireless protocol that works by […]

Continue reading