Jump to content

How to browse bluetooth devices ?


Guest shaowniq

Recommended Posts

Guest shaowniq

Hi,

does anybody know how to browse/explore bluetooth device near me ? All i can do is pair, but no explore. Can you help me by pastnig some links or sending some software to my e-mail [email protected] please ? I'm sick of this. I have HTC Typhoon variant / Eurotel SDA smartphone, Win2003 mobile SE.

HEEEEEEEELP PLEASEEEEEEEEEE

Link to comment
Share on other sites

Guest agent.m
Hi,

does anybody know how to browse/explore bluetooth device near me ? All i can do is pair, but no explore. Can you help me by pastnig some links or sending some software to my e-mail [email protected] please ? I'm sick of this. I have HTC Typhoon variant / Eurotel SDA smartphone, Win2003 mobile SE.

HEEEEEEEELP PLEASEEEEEEEEEE

<{POST_SNAPBACK}>

?????????????????????????????

do you mean like blue jacking???? sorry but mobiluck is the closest youre gonna get. to send files try smartexplorer. if you do mean bluejacking newer phones cant be taken over so i been told. gonna read up more on bluejacking tomorrow.

Link to comment
Share on other sites

Guest SiDHEaD

My old phone (Sony Ericcsson thing) allowed you to look round devices for copying stuff - save them sending it to you :D Shame the SPV can't do something so simple..

Link to comment
Share on other sites

Guest agent.m
My old phone (Sony Ericcsson thing) allowed you to look round devices for copying stuff - save them sending it to you :D Shame the SPV can't do something so simple..

<{POST_SNAPBACK}>

sounds like bluejacking to me

What is Bluejacking? (Taken from http://www.bluejackq.com/what-is-bluejacking.shtml)

You've read about it on the web; heard about it on the radio; read articles in the newspapers... but what exactly is bluejacking?

*Warning- by the end of 'What is bluejacking?' I can assure you that you'll be sick of the word 'Bluetooth'

First up, you need to know what Bluetooth is. There are lots of types of modern devices that incorporate the Bluetooth wireless communication system as one of their many features. PDAs, mobile phones and laptops are a few of these modern devices. Bluetooth means that Bluetooth enabled devices can send things like phonebook/address book contacts, pictures & notes to other Bluetooth enabled devices wirelessly over a range of about 10 metres.

So, we've got past the boring part. Now, using a phone with Bluetooth, you can create a phonebook contact and write a message, eg. 'Hello, you've been bluejacked', in the 'Name' field. Then you can search for other phones with Bluetooth and send that phonebook contact to them. On their phone, a message will popup saying "'Hello, you've been bluejacked' has just been received by Bluetooth" or something along those lines. For most 'victims' they will have no idea as to how the message appeared on their phone. So, personalised messages like 'I like your pink top' and the startled expressions that result is where the fun really starts.

That, my friends, is the basic answer to 'What is bluejacking?'

Link to comment
Share on other sites

Guest agent.m

Orange HTC C500 iMate Bluejacking Guide (taken from http://www.bluejackq.com)

1. Turn on Bluetooth by pressing Start/Settings/Bluetooth/Bluetooth, and selecting either "on" or "discoverable" then press Done/Done/Done/Home to return to the home screen

2. From the home screen select Start/Contacts then press the left hotkey, now labelled "new".

3. Type your message into the "first name" field and complete any other fields you wish to, but remember that not all phones will recognise the number of fields the C500 does!!

4. When you're finished, select "Done" and you will be returned to the Contacts list.

5. Find your contact by either scrolling down or searching and highlight it.

6. Hit Menu and then "beam contact".

7. You will then see the beaming options screen. "IR will be at the top, with "Align" in the column on the right. Below that, there will be a Magnifying Glass with "Searching" next to it. This is the device searching for Bluetooth devices. When it finds a Bluetooth device it may display the device name or MAC address.

8. Highlight the device and select the left hotkey marked "Beam".

9. The column on the right of the device name should now read "pend". If you have a successful bluejack it will read "done". If the contact is rejected it will display "fail". If the device stays on "pend" for a long time it may be waiting for acceptance, to stop trying to send, highlight it and press the rocker switch in (as if you were trying to select it).

Written by fulani

Link to comment
Share on other sites

Guest agent.m
http://mobiluck.com/index.php

http://www.binarys.com/SmartExplorer_en.asp

also in your file explorer select a file the choose send by ir then wait while it searches for bluetooth devices around you  :D

<{POST_SNAPBACK}>

Yeah like I said new phones cant be taken over to nick contacts etc apparently its illegal.

my mistake! its bluesnarfing

Bluetooth phones at risk from 'snarfing'

Munir Kotadia

ZDNet UK

February 09, 2004, 14:15 GMT

Tell us your opinion

A serious Bluetooth security vulnerability allows mobile phone users' contact books to be stolen. You've heard of bluejacking - now meet 'bluesnarfing'

A security flaw has been discovered in Bluetooth that lets an attacker download all contact details along with other information from a vulnerable phone, while leaving no trace of the attack.

Unlike bluejacking, which is where users can send a message to Bluetooth phones without authorisation, this latest discovery for the wireless-data standard allows data, such as telephone numbers and diary entries, stored in a vulnerable device to be stolen by the attacker. The new exploit is called bluesnarfing.

Bluesnarfing is said to affect a number of Sony Ericsson, Ericsson and Nokia handsets, but some models are at greater risk because they invite attack even when in 'invisible mode' -- in which the handset is not supposed to broadcast its identity and should refuse connections from other Bluetooth devices.

Adam Laurie, chief security officer at UK networking and security firm AL Digital, told ZDNet UK that the Nokia 6310, 6310i, 8910 and 8910i models were at greatest risk. "On some models of phone, you are only vulnerable to attack if you are on visible mode; however, there are other models of phones where you are vulnerable even in non-visible mode," he said.

Laurie said he discovered the problem when he was asked to test how safe Bluetooth devices actually were. "Before we deploy any new technology for clients or our own staff, one of my duties is to investigate that technology and ensure it is secure. Actually rolling your sleeves up and looking at it, not just taking the manufacturers' claims at face value. When I did that, I found that it is not secure," he said.

According to Laurie, he can initiate a bluesnarfing attack from his laptop after making a modification to its Bluetooth settings: "It is a standard Bluetooth-enabled laptop and the only special bit is the software I am using in the Bluetooth stack. I have a modified the Bluetooth stack and that enables me to perform this attack," he said.

Bluesnarfing has huge potential for abuse because it leave no trace and victims will be unaware that their details have been stolen: "If your phone is in your pocket, you will be completely unaware," he said.

Laurie said he has had trouble getting the major handset manufacturers to admit the problem exists: "I have had experts telling me that it can't possibly exist because they have been trying to do this and failing."

Although the problem may affect other Bluetooth devices, such as laptops, Laurie said they are more difficult to target because the systems are more complex: "Mobiles are liable to be more vulnerable simply because the resources for menus and configuration are limited. Manufacturers try and make Bluetooth simple to use on phones, so you don't have much granularity in setting options. On a lot of phones, Bluetooth is either on or off," he said.

Laurie said that for now, there is no fix available. He said that the only way to be completely safe is to switch off the Bluetooth functionality.

AL Digital has developed several proof-of-concept utilities, but has not released them into the wild, said Laurie. They include: Bluestumbler, to monitor and log all visible Bluetooth devices (name, MAC address, signal strength, capabilities), and identify the manufacturer from MAC address lookup; and Bluesnarf, which can copy data from a target device.

According to the AL Digital's bluestumbler Web site, vulnerable phones include: Ericsson T68; Sony Ericsson R520m, T68i, T610 and Z1010; and Nokia 6310, 6310i, 7650, 8910 and 8910i.

Nokia and Sony Ericsson were not immediately available for comment.

Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.