CAPEC-666: BlueSmacking

Standard Draft 严重程度: Medium 攻击可能性: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary uses Bluetooth flooding to transfer large packets to Bluetooth enabled devices over the L2CAP protocol with the goal of creating a DoS. This attack must be carried out within close proximity to a Bluetooth enabled device.

执行流程

步骤 1 Explore

[Scan for Bluetooth Enabled Devices] Using BlueZ along with an antenna, an adversary searches for devices with Bluetooth on.

技术:
  • Note the MAC address of the device you want to attack.
步骤 2 Experiment

[Change L2CAP Packet Length] The adversary must change the L2CAP packet length to create packets that will overwhelm a Bluetooth enabled device.

技术:
  • An adversary downloads and installs BlueZ, the standard Bluetooth utility package for Linux.
步骤 3 Exploit

[Flood] An adversary sends the packets to the target device, and floods it until performance is degraded.

前提条件

  • The system/application has Bluetooth enabled.

所需技能

Low An adversary only needs a Linux machine along with a Bluetooth adapter, which is extremely common.

后果影响

影响范围: Availability

技术影响: Unreliable Execution

缓解措施

Disable Bluetooth when not being used.

When using Bluetooth, set it to hidden or non-discoverable mode.

分类映射

分类名称 条目ID 条目名称
ATTACK 1498.001 Network Denial of Service: Direct Network Flood
ATTACK 1499.001 Endpoint Denial of Service: OS Exhaustion Flood
关键信息

CAPEC ID: CAPEC-666

抽象级别: Standard

状态: Draft

典型严重程度: Medium

攻击可能性: Medium

相关攻击模式
相关CWE弱点