CAPEC-666: BlueSmacking
CAPEC版本: 3.9
更新日期: 2023-01-24
攻击模式描述
An adversary uses Bluetooth flooding to transfer large packets to Bluetooth enabled devices over the L2CAP protocol with the goal of creating a DoS. This attack must be carried out within close proximity to a Bluetooth enabled device.
执行流程
步骤 1 Explore
[Scan for Bluetooth Enabled Devices] Using BlueZ along with an antenna, an adversary searches for devices with Bluetooth on.
- Note the MAC address of the device you want to attack.
步骤 2 Experiment
[Change L2CAP Packet Length] The adversary must change the L2CAP packet length to create packets that will overwhelm a Bluetooth enabled device.
- An adversary downloads and installs BlueZ, the standard Bluetooth utility package for Linux.
步骤 3 Exploit
[Flood] An adversary sends the packets to the target device, and floods it until performance is degraded.
前提条件
- The system/application has Bluetooth enabled.
所需技能
后果影响
影响范围: Availability
技术影响: Unreliable Execution
缓解措施
Disable Bluetooth when not being used.
When using Bluetooth, set it to hidden or non-discoverable mode.
分类映射
| 分类名称 | 条目ID | 条目名称 |
|---|---|---|
| ATTACK | 1498.001 | Network Denial of Service: Direct Network Flood |
| ATTACK | 1499.001 | Endpoint Denial of Service: OS Exhaustion Flood |