Graduate Operating Systems Mini-Project: Hacking Bluetooth In Linux Alan Joseph J Caceres.

Slides:



Advertisements
Similar presentations
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
Advertisements

1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Mobile Communications: Wireless LANs Mobile Communications Chapter 7: Wireless LANs ª Parte - Bluetooth.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
Overview The Basics Core Specification Version Spectrum International Radio Frequency Allocation Range Power Benefits Protocol Stack Bluetooth Architecture.
BLUESMIRF SILVER BY MICHAEL SANCHEZ AND HECTOR REYNA.
Paper Presentation Wi-Fi (802.11b) and Bluetooth: Enabling Coexistence Jim Lansford, Ron Nevo, and Brett Monello CSC8900 Presented by: Tu Tran.
Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung.
Jin-Shyan Lee, Yu-Wei Su, and Chung-Chou Shen
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Bluetooth Introduction The Bluetooth Technology
An Introduction to Device Drivers Sarah Diesburg COP 5641 / CIS 4930.
Hacking the Bluetooth Pairing Authentication Process Graduate Operating System Mini Project Siyuan Jiang and Haipeng Cai.
Chapter 5 outline 5.1 Introduction and services
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
Bluetooth & WPAN. 2 Bluetooth/WPAN WPAN (Wireless Personal Area Network) has a smaller area of coverage, say, 2.5 mW transmitter power, distance
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
ITED 328 Lecture 4 12 Feb 2004 Loosely covering Chapter 5 Internet and LAN Technology.
Characteristics of Communication Systems
COMMUNICATION SYSTEM (2) CT1401 LECTURE-9 : MOBILE PHONE BY : AFNAN ALAYYASH SUPERVISION : DR.OUIEM BCHIR.
Group Members Nishant Vaity Sushant Chavan Wireless Networks As early as 1901, the Italian physcist Guglielmo Marconi demostrated a ship-to- shore.
Bluetooth Background Ericsson, IBM, Intel, Nokia, and Toshiba
Wireless Communication Methods
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
King Fahd University of Petroleum & Minerals Electrical Engineering Department EE400 PROJECT Personal Area Networks Instructed by Dr.AlGhadbanPresenters.
Comnet.technion.ac.il/~cn23s00 Computer Networks Laborator y Technion Israel Institute of Technology BlueTooth High-Level Simulator A Base Platform For.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Bluetooth By Christian Doyle. Overview What is Bluetooth? What’s with the name? Establishing a connection Multiplexing Piconets Scatternets Architecture.
Lab 4 ZigBee & with PICDEM Z Boards 55:088 Spring 2006.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
SEMINAR ON BLUETOOTH TECHNOLOGY
Lectured By: Vivek Dimri Asst Professor CSE Deptt. SET.
COLONYWIRELESS September 26, Outline 1.Motivation and Goals 2.Introduction to the XBee 3.The Wireless Library 4.Example Packet Group 5.The Token.
1 Quick Review on Data Link Layer – Part 2 Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Linux Operations and Administration
Introduction for Personal Area Networks including Infrared, Bluetooth, and Near-Field Communication. Presented By Valerie Lim.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
1 Optimizing the Topology of Bluetooth Wireless Personal Area Networks Marco Ajmone Marsan, Carla F. Chiasserini, Antonio Nucci, Giuliana Carello, Luigi.
Bluetooth.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
THE EMERGING TECHNOLOGY IN WIRELESS COMMUNICATION.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
Wireless Mesh Networking or Peer to Peer Technology Andre Lukito – Johnsonsu – Wednesday, 9.
Sonal Jain, IT-BHU Bluetooth Mobile Ad Hoc Networks Sonal Jain B.Tech (IV), Electrical Engg. Dept.,ITBHU IEEE SPAVes Sept 14, 15 Institute.
Abdul Rahman Al-Refai Zavnura Pingkan. Introduction Bluetooth is a wireless technology for short range data and/ or voice communication The communication.
Pritee Parwekar. Requirements and Standards Some requirements for WSN deployment include: –Fault tolerance –Lifetime –Scalability –Real-time data.
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
Chapter 1: Wireless Networking/Technology. Wireless Networking Definition: –the technologies that enable computers to communicate using standard network.
Ben-Gurion University of The Negev Department of Communication Systems Engineering 2006 Klinger Yaniv Wertzberger Elad Supervisor:
Wireless NETWORKS NET 434 Topic No 8 Wireless PANs ZiGBee NEtworks
Channel Control Interim substates for adding new slaves
Bluetooth.
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
Bluetooth Bluetooth is a wireless LAN technology designed to connect devices of different functions when they are at a short distance from each other A.
Presentation transcript:

Graduate Operating Systems Mini-Project: Hacking Bluetooth In Linux Alan Joseph J Caceres

Overview Hacking Bluetooth in Linux Modifying Linux Bluetooth stack to pass a sequence of bytes to a device in order to establish a connection.

Introduction to Bluetooth 3 What is Bluetooth? – Form of wireless communication – Short-range – Connect multiple devices – Low data rate compared to Wi-Fi

Introduction to Bluetooth Form of wireless communication – Similar to Wi-Fi (IEEE ) – Uses short-wavelength transmissions within 2.4GHz range in the public radio spectrum – A form of ad-hoc networking – It follows the IEEE standard for Wireless Personal Area Networks (WPAN)

Introduction to Bluetooth Short-range – Because of the short-wavelength used for transmission; distance is limited – Low power device minimizes transmission distance as well – Advantageous for creating Wireless Personal Area Networks

Introduction to Bluetooth Connect multiple devices – Excellent for ad-hoc networking – Devices can create Piconets – Master / Slave devices can switch roles as needed. – Devices can range from headsets to keyboards and mice to gaming consoles like Nintendo's Wii gaming console.

Bluetooth on Linux Linux distributions using the Linux kernel and later implement the Open Source bluetooth stack BlueZ. BlueZ provides different modules for the Linux platform to interface with various bluetooth enabled devices and services.

Bluetooth on Linux For this mini-project we will be looking at the latest version of the BlueZ bluetooth stack; BlueZ How can we use a sequence of bytes to establish a connection between two bluetooth devices?

Checking out the source In the BlueZ bluetooth stack there are many modules that are provided to assist in the “pairing” of various bluetooth devices. Where do they store the passkey for these devices? It has to be in one of the modules.

A little info... Bluetooth devices have a “master/slave” relationship. When two bluetooth devices establish a connection between each other they communicate via their Media Access Control (MAC) address.

Master meet slave After a connection between bluetooth devices have be established, the “master” device need only request the “slave” by its MAC address to initiate a connection if it becomes severed. This feature is what I will be exploiting.

Hacking it In the BlueZ bluetooth stack there is a file called hidd.c that performs the connection authentication and encryption. There are specific functions within this class that use the struct bdaddr_t which is an unsigned int array.

Hacking it. The unsigned int array within bdaddr_t has a size of 6. This is basically to hold the MAC address information in integer form. A MAC address is basically six hexadecimal numbers. A call to the function str2ba() converts this into the bytes for the bdaddr_t struct.

Use the MAC Knowing the MAC address of both bluetooth devices is all that is needed to perform a “pairing”. By hard coding the MAC address of both bluetooth devices into the bdaddr_t src and dst variables this would allow the devices to stay permanently paired.

Use the MAC An example would be seen in the request_authentication() method that has two bluetooth device addresses as parameters for source and destination address. Removing these parameters or setting their default values to the devices' MAC addresses should immediately pair them when they are in range.

Tricky tricky Some devices may have MAC addresses that do not play well with the bluetooth stack. This may be because they contain 00 as the beginning or ending part of the address. They may also use a modified way of connecting to a host machine such as using the host machine's address reversed as the passkey. Hard-coding may be a way to circumvent this kind of trickery.