Category: Articles

Articles on Bluejacking

Stealing Bluetooth Link Keys

Features: This document describes that there are 2 items required to attack a bluetooth pair The ability to spoof a BD_ADDR and possession of a secret key also known as a Link Key This document discusses the possibilities of obtaining…