全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
Redifis  2012 

Blue Bugging Attack on Cell Phones with Bluetooth Technology

Keywords: blue bugging , bluetooth , security

Full-Text   Cite this paper   Add to My Lib

Abstract:

This document describes the security modes provided by the Bluetooth wireless communication technology as well as the different types of attacks that are performed to detect vulnerabilities on devices incorporating this technology. The purpose of this paper is to present the performance of computer attack blue bugging to cell phones, has been developed for this application. Net C #. This application lets you perform various actions on the attacked phone such as: Read messages, writemessages, and call transfer files. It also presents some results of tests for the execution of the attack and the conclusions they reached.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133