Bluetooth Hacking - A Case Study
Bluetooth Hacking - A Case Study
2009
Gary C. Kessler
Champlain College Center for Digital Investigation
Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer
Engineering Commons, Forensic Science and Technology Commons, and the Information Security
Commons
Recommended Citation
Browning, Dennis and Kessler, Gary C. (2009) "Bluetooth Hacking: A Case Study," Journal of Digital
Forensics, Security and Law: Vol. 4 : No. 2 , Article 4.
DOI: https://doi.org/10.15394/jdfsl.2009.1058
Available at: https://commons.erau.edu/jdfsl/vol4/iss2/4
Gary C. Kessler
+1 802-865-6460
Champlain College Center for Digital Investigation
Burlington, Vermont
Edith Cowan University
Perth, Western Australia
[email protected]
ABSTRACT
This paper describes a student project examining mechanisms with which to
attack Bluetooth-enabled devices. The paper briefly describes the protocol
architecture of Bluetooth and the Java interface that programmers can use to
connect to Bluetooth communication services. Several types of attacks are
described, along with a detailed example of two attack tools, Bloover II and BT
Info.
Keywords: Bluetooth hacking, mobile phone hacking, wireless hacking
1. INTRODUCTION
Bluetooth (BT) is one of the newer wireless technologies in use today. The
name derives from that of Harald Blaatand, a tenth-century king of Denmark
and Norway who united many independent Scandinavian tribes into a single
kingdom. Bluetooth wireless communication technology is meant to be a
universal, standard communications protocol for short-range communications,
intended to replace the cables connecting portable and fixed electronic devices
(Bluetooth SIG, 2008a). Operating in the 2.4 GHz range, Bluetooth is designed
to allow wire-free communication over a range of short-haul distances in three
power classes, namely, short range (10-100 cm), ordinary range (10 m), and
long range (100 m) (Sridhar, 2008). Cell phones, personal digital assistants
(PDAs), and smart phones are a few of the devices that commonly use
Bluetooth for synchronizing email, sending messages, or connecting to a
remote headset (Mahmoud, 2003a). What are less well known to users of
Bluetooth devices are the risks that they incur due to various vulnerabilities of
the technology. Bluehacking, bluejacking, marphing, bluesniping, and
bluesnafting are just a few of the names given to the act of hacking a device via
57
Journal of Digital Forensics, Security and Law, Vol. 4(2)
Bluetooth (Laurie, Holtmann, & Herfurt, 2006). In this paper, we will discuss
the technology needed to hack a cell phone, some of the tools, and precautions
that users can take to help protect their Bluetooth devices.
2. TECHNOLOGY
Figure 1 shows a diagram of the Bluetooth protocol stack in order to show the
various attack vectors. The protocol layers of particular interest in this paper
are:
• Logical Link Control and Adaptation Protocol (L2CAP): Provides the
data interface between higher layer data protocols and applications,
and the lower layers of the device; multiplexes multiple data streams;
and adapts between different packet sizes (Hole, 2008a, 2008d;
Sridhar, 2008).
• Radio Frequency Communications Protocol (RFCOMM): Emulates
the functions of a serial communications interface (e.g., EIA-RS-232)
on a computer. As Figure 1 shows, RFCOMM can be accessed by a
variety of higher layer schemes, including AT commands, the Wireless
Application Protocol (WAP) over the Transmission Control
Protocol/Internet Protocol (TCP/IP) stack, or the Object Exchange
(OBEX) protocol (Hole, 2008a, 2008e; Sridhar, 2008).
• Object Exchange protocol: A vendor-independent protocol allowing
devices to exchange standard file objects, such as data files, business
cards (e.g., vCard files), and calendar information (e.g., vCal files).
OBEX is a higher layer application and runs over different operating
systems (e.g., PalmOS and Windows CE) and different
communications protocols (e.g., Bluetooth and IrDA) (Gusev, n.d.).
Most of the tools that are being used to hack Bluetooth phones use the Java
programming language. In order for the software to work, the phone that is
used to initiate the attack needs to support JSR-82, which is the official Java
Bluetooth Application Programming Interface (API) (JCP, 2009). If the
attacker’s phone does not support JSR-82, that phone cannot be used to attack
other phones. This is an important note because although Bluetooth is widely
available on cell phones, Java and JSR-82 support may not be.
JSR-82 consists of two packages, namely, javax.bluetooth, which is the core
Bluetooth API, and javax.obex, which is independent of the Bluetooth stack
and provides APIs to other protocols, such as OBEX. The capabilities of JSR-
82 include the ability to (Hole, 2007; Mahmoud, 2003b):
• Register services
• Discover devices and services
58
Journal of Digital Forensics, Security and Law, Vol. 4(2)
3. BLUETOOTH SECURITY
Bluetooth defines three security modes. Security Mode 1 provides no security
enforcement, meaning that the device is effectively taking no steps to protect
itself. Security Mode 2 enforces security at the service level. In this mode, a
particular application might be relatively safe but no additional device
protection has been added. Security Mode 3 is the highest level of security,
employing link level enforced security mechanisms. Security Mode 3 protects
the device from certain intrusions and, therefore, all services and applications
(Bluetooth SIG, 2008b; Hole, 2008b; Laurie et al., 2006).
All Bluetooth services have a default set level of security. Within the service
level security, there are also three levels of security. Some services that require
authorization and authentication in order to be used, some require
59
Journal of Digital Forensics, Security and Law, Vol. 4(2)
authentication only, and some are open to all devices (Bluetooth SIG, 2008b).
Bluetooth devices themselves have two levels of security when describing
other devices, namely trusted devices and untrusted devices.
4. TYPES OF ATTACKS
There are a variety of attacks that can be employed against Bluetooth devices,
many with colorful names such as bluebugging, bluebumping, bluedumping,
bluejacking, bluesmacking, bluesnarfing, bluespooofing [sic], bluestabbing,
bluetoothing, and car whisperer. All take advantage of weaknesses in
Bluetooth that allow an attacker unauthorized access to a victim's phone. It is
imperative to note that while Bluetooth is commonly associated with networks
limited in scope to 100 m, attacks on Bluetooth devices have been documented
at ranges in excess of 1,500 m. using Bluetooone [sic] (Laurie, 2006).
One common approach to hacking Bluetooth devices is to employ malformed
objects, which are legal files exchanged between BT devices that contain
invalid information, thus causing unexpected results. When a Bluetooth device
receives a malformed object, such as a vCard or vCal file, the device may
become unstable or fail completely. Alternatively, an attacker might also use a
vCard or vCal file to inject commands allowing the attacker to take control of
the device. This kind of an attack can be very harmful to a phone (E-Stealth,
2008; Laurie et al., 2006).
Some of the common attacks on Bluetooth devices include:
• Bluebugging: An extraordinarily powerful attack mechanism,
bluebugging allows an attacker to take control of a victim's phone
using the AT command parser. Bluebug allows an attacker to access a
victim's phone in order to make phone calls, send short message
service (SMS) messages, read SMS messages stored on the phone,
read and write contact list entries, alter phone service parameters,
connect to the Internet, set call forwarding, and more (Bluebugging,
n.d.; Laurie et al., 2006).
• Bluejacking: The sending of unsolicited messages to open Bluetooth
devices by sending a vCard with a message in the name field and
exploiting the OBEX protocol (Bluejacking, 2009).
• Bluesmack: A Bluetooth analog of the Ping-of-Death denial-of-service
attack. This is a buffer overflow attack using L2CAP echo messages
(Bluesmack, n.d.; Laurie, 2006).
60
Journal of Digital Forensics, Security and Law, Vol. 4(2)
61
Journal of Digital Forensics, Security and Law, Vol. 4(2)
tool, these programs are often platform-dependent so that they work best on
certain brands of devices and may not work on all devices; MiyuX, for
example, works best on Sony Ericsson phones. A nice collection of all of these
tools in one package can be found at tradebit
(http://www.tradebit.com/filedetail.php/5006527-basic-bluetooth-spy-
software).
5.1 Testing the Software
The first author experimented with the feasibility of actually using this
software in a real environment, employing Bloover II (which allows an
attacker to obtain information from a victim's phone) and BT Info (which
allows an attacker to control the victim’s phone). Both were part of the
Ultimate Bluetooth Mobile Phone Spy Software New Edition 2008 available
from E-Stealth (http://www.e-stealth.com/).
It is worth noting that this software claims to be useable on any Bluetooth
phone to hack any other Bluetooth phone but, like so many software claims,
this one was overstated. Initial attempts to use the software on a Sanyo SCP-
7050 failed because the software could not be installed. Later, the first author
purchased a BlackBerry Curve. Although the software user guide provided
instructions on how to install the software on a BlackBerry, the install failed
when an error stated that the phone did not support the correct Java API.
The phones that were used successfully for testing throughout this project were
United Kingdom versions of a Sony Ericsson W550i and a W800i. Theses
phone both support JSR-82 enabling them to run the software. In order to
actually use the phones, a Subscriber Identity Module (SIM) card was needed
for each phone. The SIM card does not actually need to be active if the attacker
is only going to be probing and manipulating the target phone and not making
calls. Throughout the testing for this project both phones used inactive SIM
cards.
5.2 Bloover II
Bloover (also known as Blooover), standing for Bluetooth Wireless
Technology Hoover, is a proof-of-concept application. Bloover II is a second-
generation version of a program that consists of several different types of
attacks, including Bluebug, Bluesnarf, Helomoto, and the use of malformed
objects. Breeder is a related program that propagates Bloover II clients (Laurie
et al., 2006).
The attack software package that was purchased included a program called
Bloover II. Once a JSR-82 enabled phone was found, the program installed
easily. As for running the program, it seemed to always halt on one of the
processes. One of the processes that the software kept halting on was when the
program was running the “HeloMoto” attack. During this attack, the hacking
phone tries to “plant” an entry into the victim’s phonebook. Within the options
62
Journal of Digital Forensics, Security and Law, Vol. 4(2)
of the Bloover II program, the hacker can chose which attacks they would like
to use on the victim’s phone. When going through and trying each attack by
itself, the software would always halt on some process. The only operation that
could be conducted was the initial audit of the phone to get basic information
about the phone.
Figure 2 shows a series of screen shots using Bloover II from a W550i phone
to access a W800i phone. Figure 2a shows the attacker's phone scanning for
another Bluetooth phone; in Figure 2b, a device named W800i is found. The
audit feature of Bloover is initiated (Figure 2c) and results (Figure 2d) include
the target device's address, communications channel for communication with
the headset and other functional profiles, the RFCOMM channel, and phone
contact information. A specific attack type (Bluebug in this case) is selected
from the Quick Config menu (Figure 2d).
2d) 2e)
Figure 2. Bloover II screen shots.
63
Journal of Digital Forensics, Security and Law, Vol. 4(2)
5.3 BT Info
Because of increased functionality, a larger amount of time was spent using a
program called BT Info. With this program, the attacker can completely control
the target device if the attacker can become paired with the target. Once the
Bluetooth pairing takes places, the attacker can perform a broad set of
functions on the target phone, ranging from placing a phone call or sending an
SMS message to turning the phone off or performing a master reset. The
hardest part for the attacker, in fact, is finding a device with an open Bluetooth
connection or tricking someone into pairing his or her phone.
3a) 3b)
3c) 3d)
64
Journal of Digital Forensics, Security and Law, Vol. 4(2)
4a) 4b)
4c) 4d)
Figure 4. BT Info screen shots (initial menu functions).
65
Journal of Digital Forensics, Security and Law, Vol. 4(2)
The Calling menu (Figure 4d) offers four options, allowing the attacker to dial
any number, hang up a call, place a current call on hold, or redial the last
number. An attacker can use the Calling option, for example, to call a second
phone owned by the attacker in order to listen in on the victim's conversations.
If the target phone has a speaker function that operates when the phone is
closed, the attacker can still be able to establish a call and listen in. From the
main Actions menu, the attacker can also change the display language that the
phone uses.
5a) 5b)
5c) 5d)
The Keys function (Figure 5a) is a feature of BT Info that allows an attacker to
66
Journal of Digital Forensics, Security and Law, Vol. 4(2)
watch the keys that the victim pushes as they are being pushed or allows an
attacker to remotely press keys on the victim's phone. For the latter function,
the attacker can access the target phone's "joystick" keys (Figure 5b) or
individual keypad keys (Figure 5c). The control function of BT Info (Figure
5d) allows the attacker to remotely access the target's control keys, including
volume control, media player, and camera.
BT Info also gives an attacker access to the target phone's text messages. The
SMS action (Figure 6a), for example, allows the attacker to select a mailbox on
the victim's phone and retrieve the complete contents of all SMS messages.
Some of the other actions are simply informational, including the temperature
of the phone, what Bluetooth devices are trusted on the victim’s phone, what
sound, if any, the phone makes when a button is pressed, the memory status,
and what action forces a keylock.
The Operations action (Figure 6b) has several options. Automatic Keylock
gives an attacker the ability to automatically lock the victim's when it is
unlocked; i.e., when the victim unlocks the phone, it will automatically relock
itself. The Random Time and Date Change option randomly changes the date
and time on the victim's roughly a hundred times per minute. Similarly, the
Random Alarm option randomly sets the victim phone's alarm settings.
The Custom Command function (Figure 6c) allows an attacker to power down
or force a master reset on a victim's phone. This function can also be used to
67
Journal of Digital Forensics, Security and Law, Vol. 4(2)
68
Journal of Digital Forensics, Security and Law, Vol. 4(2)
vulnerable Bluetooth technology really is. The idea that someone could listen
to all conversations a victim is having without them even knowing, or have
their text messages read, are key examples of the dangers of Bluetooth. Even
worse, an attacker can initiate a call to someone or text someone without the
victim ever knowing. The only way a user would be able to catch this activity
is if they were to look through their call log or look at the sent messages on
their phone. Even that might be insufficient, as the attacker can delete the
records of their nefarious activity and the victim would never know until their
bill comes out. The victim would only know about unusual behavior if they
carefully look at their bill, which is increasingly problematic since many
people do not even look at their detailed call records. And even if someone
complains that they "did not make a call on this date and time," the mobile
service carrier has proof that the call was made from this device because,
indeed, it was.
Users need to be made aware of the vulnerabilities of these devices so that they
can employ them more effectively, safely, and confidently.
ACKNOWLEDGEMENTS
This work was partially supported by Grant No. 2006-DD-BX-0282 awarded
by the Bureau of Justice Assistance. The Bureau of Justice Assistance is a
component of the Office of Justice Programs, which also includes the Bureau
of Justice Statistics, the National Institute of Justice, the Office of Juvenile
Justice and Delinquency Prevention, and the Office for Victims of Crime.
Points of view or opinions in this document are those of the author and do not
represent the official position or policies of the United State Department of
Justice.
AUTHOR INFORMATION
Dennis Browning received his B.S. degree in Computer & Digital Forensics
from Champlain College in May 2009 and currently works in the Information
Technology Department at Fletcher Allen Health Care in Burlington, Vermont.
Gary C. Kessler, Ed.S., CCE, CISSP, is an Associate Professor, director of the
M.S. in Digital Investigation Management program, and principle investigator
at the Center for Digital Investigation at Champlain College. He is also an
adjunct associate professor at Edith Cowan University in Perth, Western
Australia.
REFERENCES
Bluebugging. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, from
http://trifinite.org /trifinite_stuff_bluebug.html
Bluejacking. (2009, January 6). Wikipedia. Retrieved January 27, 20909, from
http://en.wikipedia.org/wiki/Bluejacking
Bluesmack. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, from
69
Journal of Digital Forensics, Security and Law, Vol. 4(2)
http://trifinite.org /trifinite_stuff_bluesmack.html
BlueSnarf. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, from
http://trifinite.org /trifinite_stuff_bluesnarf.html
Bluesnarfing. (n.d.). Bluejacking Tools: The Biggest Collection of Bluetooth
Tools on the Internet Web site. Retrieved January 27, 2009, from
http://www.bluejackingtools.com /bluesnarfing/
Bluetooth SIG. (2008a). How Bluetooth Technology Works. Bluetooth.com
Web site. Retrieved January 6, 2009, from
http://www.bluetooth.com/Bluetooth/Technology/Works/
Bluetooth SIG. (2008b). Security. Bluetooth.com Web site. Retrieved January
6, 2009, from
http://www.bluetooth.com/Bluetooth/Technology/Works/Security/
D3scene. (2008, April 30). BTInfo. Retrieved January 29, 2009, from
http://www.d3scene.com /forum/general-mp/13279-btinfo.html
E-Stealth.com. (2008). Ultimate Bluetooth Mobile Phone Spy Software User
Manual. Retrieved January 29, 2009, from
http://www.jamsa.us/inventory/UltimateMobilePhoneSpyManual.pdf
Getjar. (2008, March 10). STM Bluetooth Software and Tools. Retrieved
January 29, 2009, from http://www.getjar.com/products/8042/STMBlueS
Gusev, A. (n.d.). Object Exchange (OBEX) Protocol Primer. Developer.com
Web site. Retrieved January 29, 2009, from
http://www.developer.com/ws/article.php/3573636
Helomoto. (n.d.). trifinite.stuff Web site. Retrieved January 27, 2009, from
http://trifinite.org /trifinite_stuff_helomoto.html
Hole, K.J. (2007, March 2). Bluetooth -- Part 3: Link Controller and JSR-82
API Architecture. Retrieved January 29, 2009, from
http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth3alt.pdf
Hole, K.J. (2008a, February 24). Bluetooth -- Part 1: Overview. Retrieved
January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-
PDF/Bluetooth1alt.pdf
Hole, K.J. (2008b, March 8). Bluetooth -- Part 10: Introduction to Wireless
Security. Retrieved January 29, 2009, from
http://www.kjhole.com/Standards/BT/BT-PDF/Bluetooth10alt.pdf
Hole, K.J. (2008c, March 8). Bluetooth -- Part 4: Link Manager and J2ME
Programming. Retrieved January 29, 2009, from
http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth4alt.pdf
Hole, K.J. (2008d, March 11). Bluetooth -- Part 6: Logical Link Control and
Adaptation Protocol. Retrieved January 29, 2009, from
70
Journal of Digital Forensics, Security and Law, Vol. 4(2)
http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth6alt.pdf
Hole, K.J. (2008e, March 23). Bluetooth -- Part 7: RFCOMM. Retrieved
January 29, 2009, from http://www.kjhole.com/Standards/BT/BT-
PDF/Bluetooth7alt.pdf
Hole, K.J. (2008f, March 29). Bluetooth -- Part 8: The JSR-82 API for Device
Discovery. Retrieved January 29, 2009, from
http://www.kjhole.com/Standards/BT/BT-PDF /Bluetooth8alt.pdf
Java Community Process (JCP). (2009). JSR 82: Java APIs for Bluetooth.
Community Development of Java Technology Specifications Web site.
Retrieved January 27, 2009, from http://jcp.org/en/jsr/detail?id=82
Jansen, W., & Scarfone, K. (2008, October). Guidelines on Cell Phone and
PDA Security. National Institute of Standards and Technology Special
Publication 800-124. Retrieved February 24, 2009, from
http://csrc.nist.gov/publications/nistpubs/800-124/SP800-124.pdf
Laurie, A., Holtmann, M., & Herfurt, M. (2006, March 30). Bluetooth
Hacking. WEBSEC 2006, London, U.K. Retrieved January 27, 2009, from
http://trifinite.org/Downloads /trifinite.presentation_websec2006.pdf
Mahmoud, Q.H. (2003a, February). Wireless Application Programming With
J2ME and Bluetooth. Sun Developer Network (SDN) Web site. Retrieved
January 27, 2009, from
http://developers.sun.com/mobility/midp/articles/bluetooth1/
Mahmoud, Q.H. (2003b, April). Part II: The Java APIs for Bluetooth Wireless
Technology. Sun Developer Network (SDN) Web site. Retrieved January 7,
2009, from http://developers.sun.com /mobility/midp/articles/bluetooth2/
SE-NSE. (2006, November 5). MiyuX. se-nse v5 Web site. Retrieved January
29, 2009, from http://forums.se-nse.net/index.php?showtopic=5653
Sridhar, T. (2008, December). Wi-Fi, Bluetooth, and WiMAX. The IP Journal,
11(4), 2-17.
Tutorial-Reports.com. (n.d.). Bluetooth Tutorial: Protocol Stack. Retrieved
January 28, 2009, from
http://www.tutorial-reports.com/wireless/bluetooth/protocolstack.php
71
Journal of Digital Forensics, Security and Law, Vol. 4(2)
72