A bluetooth is a wireless technology with an open wireless protocol for exchanging data over a short distance from fixed and mobile devices which replaces the cable connecting portable or fixed devices while maintaining high level of security.

Bluetooth is connected to another Bluetooth enabled electronic devices which allows these devices to communicate wirelessly through short-range, ad hoc networks known as piconets. Piconets are established dynamically and automatically as Bluetooth enabled devices enter and leave radio proximity meaning that you can easily connect whenever and wherever it is convenient for you.

The ways in which you can connect your Bluetooth devices are almost limitless- meaning individual devices in a piconet can also simultaneously communicate with up to seven other devices within that single piconet. Each device can also belong to several piconets simultaneously.

The strength of Bluetooth wireless technology is the ability to handle data and voice transmissions simultaneously which provides users with a variety of innovative solutions such as hands-free headsets for voice calls, printing and fax capabilities, and synchronization for PCs and mobile phones, etc. Bluetooth technology does operates in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec. The 2.4 GHz ISM band is available and unlicensed in many countries.

Bluetooth technology’s adaptive frequency hopping (AFH ) has a capabilities which was designed to reduce interference between wireless technologies sharing the 2.4 GHz spectrum. AFH works within the spectrum to take advantage of the available frequency. This is done by the technology detecting other devices in the spectrum and avoiding the frequencies they are using.

Bluetooth Security

In all the wireless networking setup, security is a major big concern. Wireless devices can easily grab radio waves out of the air, so people who send sensitive information over a wireless connection need to take precautions to make sure those signals aren't intercepted.

Bluetooth technology is not exempted - it's wireless and therefore susceptible to spying and remote access, just like the WiFi is susceptible if the network is less secured. With Bluetooth, though, the automatic nature of the connection, which is a huge benefit in terms of time and effort, is also a benefit to people looking to send you data without your permission.

Mobile Bluetooth Hacking

Bluetooth wireless communication allows mobile phones devices to connect to other mobile phone devices within range of 10 meters. In general Bluetooth is a protocol allows devices to transfer multimedia content and other sort of data to each other in the range. Most of the smartphone’s attack or threats nowadays involve Bluetooth communication to an extend level. Mobile Bluetooth hacking can be related to many types threats and attack made to unsuspecting smartphone users.

Bluetooth communication has three different security modes which each of them become active and being used at different times.

  • 1. Non secure security mode

Mobile devices with non-secure mode will not follow any sort of security being asked. In additional features like pairing, encryption and authentication are bypassed and not required. Therefore this type of security mode is used during Blue-Jacking Attacks which is explained below.

  • 2. Service level security mode

This security mode involves central security manager that control access to the services and the devices. Whenever users try to connect to the Bluetooth a number of security procedures are applied. This allows access to a particular user to a given service by denying access to other services. In other word

  • 3. Link-level security mode

This security measure is the most secure security for Bluetooth devices. This security mode implements and apply authorization and security procedures even though communication though devices are made. Unfortunately most of the Bluetooth protocols suffer from a various threats, loopholes and attacks made by hackers using different type of software and technique.

Some of the most attacks made to smartphone are:
• BluePrinting attack, is use to gather information into targeted system. This technique will enable Bluetooth hacker to determine manufacturer, model, version, etc. of the targeted enable Bluetooth mobile devices. This hacking allows attackers to query devices without the need of carry out pairing both devices.
• BlueJack Attack is a method use to send an unidentified message from an enable Bluetooth mobile phone to another without knowing the source of the received message to the recipient.
• BlueSnarf Attack is a well-known attack of connecting exposed mobile phone to through Bluetooth without the awareness of the user. This attack involves OBEX protocol that allows that attack to forcibly push and pull confidential data in and out of the mobile phone user. (This is also known as OBEX Pull Attack).
• Blue backdoor Attack, allows the attacker to have complete access and control over the connected Bluetooth devices but allows the attackers to insert additional commands to continue access.

RememberBluetooth hacker’s use BTCRACK Application as a pass phrase cracking tool aims to reconstruct passkey and link key from paring exchange. Also by using some of the most advanced program such as BlueFang as a force tool program to find none discovered devices.
Without doubt Bluetooth wireless communication technologies has been expanded and more advanced features are implemented but testing has proved that none of those Bluetooth technologies with advanced features protects users from hackers.


Patrick M. Davila. (September 2007). Hacking Cell Phones via Bluetooth Tools.

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License