From: Jarrod Frates (jfrates.ml@gmail.com)
Date: Mon Sep 25 2006 - 12:50:28 EDT
On 9/24/06, Kevin white <kwhite@ci.collierville.tn.us> wrote:
> Recently we have discovered that one of the employees in our
> organization has purchased a bluetooth keyboard. Their belief
> is that if someone were to sniff their keystrokes they would have to be
> within 30 feet.
Most consumer-grade devices would have difficulty pulling in a
coherent signal at 30 feet. On that point, the user is mildly
correct. However, it is not terribly difficult to find Bluetooth
devices with external antennas and correspondingly greater range, and
anyone with a little bit of skill can modify an existing device to
allow for tremendous ranges, as shown here:
http://www.pentest.co.uk/documents/bt_dongle_mod/bt_dongle_mod.html
> Based on what I saw at Black Hat I am a little less
> paranoid since the vendor could be doing something to protect the
> keystrokes and BT is somewhat of a strange protocol anyway. I guess I'll
> never really know till I go out there with my own BT dongle and capture
> some traffic myself, if possible. ;)
In a presentation on Bluetooth in March 2006, Joshua Wright (developer
of asleap and some other useful tools) demonstrated a technique he
called Bluepinning. It was able to crack the PIN used to secure a
connection between Bluetooth devices with astounding ease; as I
recall, a six-digit PIN was broken live in about three minutes on an
800MHz P3 notebook, and it scales at a factor of 10 per digit, i.e., a
seven-digit PIN would take about 30 minutes, an eight-digit PIN about
five hours, etc. How often is the PIN changed in *your* Bluetooth
devices? More importantly, on which Bluetooth devices are you even
*able* to change the PIN from its factory setting?
The exploit remains in private hands, but there's no telling whether
someone has been able to duplicate the method. This, along with
several other aspects of Bluetooth, has made me disable it on
everything that I am assigned at work, and avoid purchasing it
wherever possible, except for additional devices intended to be used
for captures and analysis.
Bluetooth is, IMHO, marginally more secure than some of the old
wireless keyboards, but I wouldn't put one on my desk without a
significant alteration in how encryption is handled. According to
Joshua, Bluetooth had a design goal of radios that cost $5 to make
them more attractive to consumers by way of lower cost. Just how much
encryption can you cram in a $5 radio?
---- Jarrod Frates GAWN ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW ------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:00 EDT