Bluetooth Vulnerabilities and Attacks Flashcards

(9 cards)

1
Q

What is Bluetooth?

A

Wireless technology for short-distance data exchange between fixed and mobile devices without needing an internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Insecure pairing?

A

Occurs when Bluetooth devices establish a connection without proper authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Device Spoofing?

A

Occurs when an attacker impersonates a device to trick a user into connecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are On-path attacks?

A

Exploits Bluetooth protocol vulnerabilities to intercept and alter communications between devices without either party being aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Bluejacking?

A

Sending unsolicited messages to a Bluetooth device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Bluesnarfing

A

Unauthorized access to a device to steal information like contacts, call logs, and text messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Bluebugging?

A

Allows attackers to take control of a device’s Bluetooth functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Bluesmack?

A

Denial-of-service attack by overwhelming a device with data, causing it to crash or become unresponsive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Blueborne?

A

Spreads through the air to infect devices without user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly