What is fuzzing?
Fuzzing is the process of feeding an implementation with large amounts of unexpected, malformed or random input to identify parsing bugs, crashes or logic flaws.
In Wi-Fi fuzzing, what is typically used as input instead of a string in a file?
In Wi-Fi the input isn’t a string in a file, it’s mostly 802.11 frames, including the management frames, control frames and data frames.
What are typical targets of 802.11 fuzzing?
Targets of 802.11 fuzzing are wireless drivers, AP firmware, and wireless supplicants.
What is the goal of fuzzing 802.11 implementations?
The goal of fuzzing is to find conditions where the implementation causes crashes, reboots, enters a denial of service state, or misparses frames.
How does an attacker practically carry out 802.11 fuzzing?
An attacker will generate malformed 802.11 frames and transmit them over the air toward the target.
Name some 802.11 fields that can be fuzzed.
Fields that can be fuzzed include the SSID IE, RSN, IE lengths and more.
What is Bluetooth described as in the document?
Bluetooth is a short-range wireless technology which comes in two main flavours.
What are the two main flavours of Bluetooth?
The two main flavours of Bluetooth are Bluetooth Classic (BR/EDR) and Bluetooth Low Energy (BLE).
What is Bluetooth Classic (BR/EDR) mainly used for?
Bluetooth Classic (BR/EDR) is higher throughput, used for audio such as headsets and speakers, HID and similar uses.
What is Bluetooth Low Energy (BLE) mainly used for?
Bluetooth Low Energy (BLE) is optimised for low power and is used by wearables, beacons and IoT.
What is Classic pairing authentication vulnerable to?
Classic pairing authentication is vulnerable to an offline PIN attack, where an attacker is able to eavesdrop on the initial pairing exchange to capture the plaintext inputs which can be used to guess the PIN.
What is said about Bluetooth authentication during initial pairing?
Bluetooth authentication is weak during initial pairing.
What can be done regarding non-discoverable Bluetooth devices?
It is possible to identify non-discoverable devices.
What is BTCrack?
BTCrack is a Bluetooth PIN cracking tool written for Windows that accepts the input algorithm values in the GUI.
What is one recommendation if Bluetooth is unnecessary?
If Bluetooth is not needed, disable the feature and do not rely on marking devices as not-discoverable.
Why make Bluetooth devices non-discoverable?
While not a foolproof security mechanism, making a Bluetooth device non-discoverable can significantly help in securing Bluetooth.
What should be done with unneeded Bluetooth profiles?
Unneeded Bluetooth profiles should be disabled.
How can software maintenance help against Bluetooth attacks?
Maintaining software versions whenever possible helps to mitigate known threats.
In what types of devices does BLE have wide-ranging adoption?
BLE has a wide-ranging adoption, from medical devices, fitness trackers, physical security systems and others.
Why can Classic Bluetooth be too costly to implement in some devices?
Classic Bluetooth can be too costly to implement due to a complex stack and massive power draw.
What kinds of devices are best suited for BLE?
Devices where BLE excels are often low power and short on RAM.
What was a key design goal in BLE regarding power and data transfers?
A key design goal in BLE was low-power support for modest data transfers over five years with a single coin battery.
How does BLE support its low-power design goal?
BLE uses very aggressive power conservation in order to support its design goal of modest data transfers over five years with a single coin battery.
Why does BLE see strong adoption compared to some other protocols?
BLE sees adoption due to more brand recognition; other protocols that offer short, bursty data transfers such as ZigBee and Near-Field Communication do not have the same adoption.