翻訳と辞書 |
Bluesniping
Bluesniping has emerged as a specific form of Bluesnarfing, a method for identifying Bluetooth enabled devices at longer ranges than normally possible. According to (''Wired'' magazine ), this method surfaced at the Black Hat Briefings and DEF CON hacker conferences of 2004 where it was shown on the G4techTV show ''The Screen Savers''. ==Parts and methodology==
In the article ("'Rifle' Sniffs Out Vulnerabilities" ), the 'rifle' features a directional antenna, Linux-powered embedded PC, and Bluetooth module all mounted on a Ruger 10/22 folding stock. According to (Flexilis ), the rifle is capable of targeting Bluetooth at ranges over . This type of Bluesniping has been utilized to demonstrate the increasing security vulnerability of Bluetooth devices. According to the Bluetooth Special Interest Group, in order to break into a Bluetooth device, an attacker must "force two paired Bluetooth devices to break their connection", known as Blueballing. One should take away from this the caveat of never pairing with unknown devices or in public places. The connection between one's cellular phone and one's Bluetooth-enabled headset, for instance, could be broken and the cellular phone may be able to be highjacked by the remote "Bluesniper" for one purpose or another.
抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Bluesniping」の詳細全文を読む
スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース |
Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.
|
|