Active Topics

 


Reply
Thread Tools
Posts: 9 | Thanked: 0 times | Joined on Aug 2007
#1
Hello

Firstly i would like to say im very impressed with this forum. It has a lot of useful information and quite a good read.

My name is Scott Thomas and i work for a telecommunications company in Dublin, Ireland. I am working on a presentation that demonstrates the vunrability of mobile phones with Bluetooth devices let on.

Because of this , i bought a Nokia 770, i;ve spent nearly 6 hours on the internet and this is how far i've got.

I've installed X Terminal , and BTScanner2.1 and when i open X terminal and type in "hcitool scan" i do find my mobile phone.

What can i do from here?? How do i activate BTScanner from this point? I think im using OS2006 but not sure.

I am presenting my work to about 40 senior executives..is there any any any way someone can help me out please?

Scott.thomas3006@gmail.com

Regards
Scott.
 
tabletrat's Avatar
Posts: 481 | Thanked: 65 times | Joined on Aug 2007 @ Westcountry, UK
#2
Hi, If you just bought your 770, you almost certainly have 2006 (unless it has been in a shop for a few years)
Surely if you are giving a presentation on the vulnerability of mobile phones with bluetooth on, you already know what the vulnerabilities are? In which case, what information are you trying to get from bluetooth? Just a network trace, or are you trying to send something?
 
barry99705's Avatar
Posts: 641 | Thanked: 27 times | Joined on Apr 2007
#3
So, you're doing a presentation on the vulnerabilities of bluetooth enabled mobile phones, but you don't know how to exploit them? Maybe you ought to just add the video that's on youtube and add a few web links to your power point presentation. Sounds like you in over your head already.
__________________
Just because you are online, doesn't mean you don't have to form a full sentence.


SEARCH! It's probably already been answered.
 
iball's Avatar
Posts: 729 | Thanked: 19 times | Joined on Mar 2007
#4
How you got this far in your chosen profession without using proper spelling and grammar is beyond me.
Best bet is to go find someone smarter than you to give this "presentation".
But methinks you've somehow trapped yourself into giving this thing, so your best bet is to look here first.

In other words script-kiddie, don't expect much help here.
Checking your other posts it seems all you want is to run around "hacking" things with your N770 and your limited technical and logical abilities.
Doing that is an art form and you're lacking in the artistic talent department if you can't figure out how to use Google.
 
Traecer's Avatar
Posts: 165 | Thanked: 9 times | Joined on Jul 2007
#5
Well, that gives us a more plausible explanation as to why you'd want to hack into people's phones! Though if I knew the exact steps, I'm not sure I'd share them.
 
Posts: 9 | Thanked: 0 times | Joined on Aug 2007
#6
Hi all

Im not a hacker..far from it. Im an accountant.

A presentation will be more effective with a live demonstration and not a video file. I've no choice, but if you guys dont know, thanks all the same. I'll keep trying.



Regards
Scott.
 
Posts: 45 | Thanked: 3 times | Joined on Aug 2007
#7
I call ******** (please excuse my language)
 
tabletrat's Avatar
Posts: 481 | Thanked: 65 times | Joined on Aug 2007 @ Westcountry, UK
#8
Originally Posted by iball View Post
How you got this far in your chosen profession without using proper spelling and grammar is beyond me.
Not that I want to pick or anything, but I didn't think the spelling was bad (apart from obvious accidents, there was just one mistake).
 
tabletrat's Avatar
Posts: 481 | Thanked: 65 times | Joined on Aug 2007 @ Westcountry, UK
#9
Originally Posted by scott_thomas3006 View Post
Im not a hacker..far from it. Im an accountant.
A presentation will be more effective with a live demonstration and not a video file. I've no choice, but if you guys dont know, thanks all the same. I'll keep trying.
My question still stands, what exactly are you trying to show. How can we tell you how to get the result you want if you wont say what you are trying to demonstrate.
 
Posts: 90 | Thanked: 32 times | Joined on Sep 2006 @ Bucuresti, Romania
#10
Hello Scott,

I'm sorry to say that you're out of luck. The bluetooth hack you saw on youtube using a 770 is actually an exploit of an error in older Nokia S60 phones (S60 platform 1 and 2) that allowed serial connections without prompting the user for accept or passwords; other services as DUN were protected, but by issueing AT commands the attacker could obtain various information from the phone, as contacts list, or make the phone do stuff, like calling a number or sending an SMS. The preffered way of attack was making a call to a premium number.

I don't think you'll find such phones still in the wild (they're pretty old for cell phone technology after all).

I'm not aware of bluetooth vulnerabilities in more recent Nokia phones or in other cells. You can try search the net.

It's important to say that the 770 is just a convenient portable computer with bluetooth, and not necessarily required to perform the attack. The attack can be run as well from a laptop, or any J2ME phone running the good attack program.

Alex
 
Reply


 
Forum Jump


All times are GMT. The time now is 13:53.