Wireless and Cellular Networks
Wireless Networks:
-
Li-Fi: Uses light for communication, boasting speeds that surpass Wi-Fi.
-
Zigbee: A low-energy wireless protocol tailored for IoT devices.
-
Satellite: Leverages orbiting satellites for communication.
Zigbee Personal Area Network (PAN)
-
Description: A short-range wireless PAN technology tailored for automation, machine-to-machine communication, remote control, and IoT device monitoring.
-
Security Features:
- Supports both centralized and decentralized security models.
- Relies on securely transmitted symmetric keys (typically encrypted in-transit).
-
Potential Vulnerability: During the pre-configuration phase, there's a brief window when a single key might be transmitted without protection.
-
Use Cases: Commonly found in IoT and smart home hubs (Amazon Echo, Philips Hue Lights)
Bluetooth & IEEE 802.15
Definition: Bluetooth falls under the IEEE 802.15 standard, commonly known as a Personal Area Network (PAN).
Usage:
- Bluetooth connects devices such as cell phone headsets, mice, keyboards, GPS, and many other gadgets.
- Bluetooth has historically been a target for various exploits, making it a significant wireless security concern. Bluetooth's many vulneraries can be seen with a quick "Bluetooth exploit" Google search.
Connection Setup:
-
Devices connect via pairing, where a primary device scans for other devices on the 2.4GHZ radio frequency.
-
Pairing typically uses a 4-digit code. This is not primarily a security feature, but rather to prevent accidental connections.
Mobile System Attacks: Bluetooth Vulnerabilities
Bluejacking (Annoyance)
Definition: Bluejacking is akin to a digital prank, similar to the real-world "ding-dong-ditch."
How it works:
-
Tech-savvy individuals push unsolicited messages to other Bluetooth users within proximity.
-
The intent is often to annoy or playfully engage them.
-
This exploits a loophole in Bluetooth's messaging options.
Bluejacking is more about mischief than causing harm.
Bluesnarfing (Data Theft)
Definition: A serious threat where unauthorized users wirelessly connect to early Bluetooth devices to illicitly access and manipulate data.
How it works:
-
The attacker stealthily connects to the device without the owner's knowledge.
-
Once connected, they can download and even alter data.
Bluesnarfing directly jeopardizes user data and privacy.
Bluebugging
Definition: A more advanced form of Bluesnarfing where attackers gain comprehensive remote control over a Bluetooth device.
How it works:
-
The attacker exploits vulnerabilities to control various features and functionalities.
-
This can involve activating microphones, using the phone as a surveillance tool, or manipulating device settings.
Bluebugging provides attackers with an alarming amount of control over the victim's device.