Stealing Bluetooth Link Keys

Features:

  • This document describes that there are 2 items required to attack a bluetooth pair
  • The ability to spoof a BD_ADDR and possession of a secret key also known as a Link Key
  • This document discusses the possibilities of obtaining such keys.