p9hundred Joined: Jan 15, 2004 Posts: 23 From: Norway PM |
The SNARF attack:
It is possible, on some makes of device, to connect to the device without alerting the owner of the target device of the request, and gain access to restricted portions of the stored data therein, including the entire phonebook (and any images or other data associated with the entries), calendar, realtime clock, business card, properties, change log, IMEI (International Mobile Equipment Identity [6], which uniquely identifies the phone to the mobile network, and is used in illegal phone 'cloning'). This is normally only possible if the device is in "discoverable" or "visible" mode, but there are tools available on the Internet that allow even this safety net to be bypassed[4]. Further details will not be released at this time (see below for more on this), but the attack can and will be demonstrated to manufacturers and press if required.
Well..... I am on holiday and i have discovered there are some serious guys out there doin some serious stuff with the BLUETOOTH. I was hit but i noticed it and had to kill my BLUETOOTH conx.
I have since then been making inquires when in Internet cafs but i really havent been given real oppurtunity. if ne knows how and using wot it is possible please let me know.
info @ http://www.bluestumbler.org
--==<< help me find an end to trial >>==-- |