Underground – Bluetooth Hacking

In this Underground Video, Strome explains several bluetooth attacks used against mobile phones. He demonstrates the Bluebug attack which exploits a security loophole on cell phones allowing the attacker to take full control of the device. The Bluebug attack enables an attacker to initiate calls, read & send SMS messages, read & edit the phone book, and change settings. Furthermore, Strome shows another popular bluetooth attack called Bluesnarfing a.k.a. the OBEX Push Attack. Bluesnarfing allows an attacker to extract, create, and delete files on the mobile device.

Note: These bluetooth attacks only work on a hand full of cell phones.
Download Here

If you would like to submit a video to Infinity Exists Underground send an email describing your video to underground@infinityexists.com