The wireless wiretap
Corporations and institutions are spending a lot of money to keep their data and voice networks protected against unauthorized access. Surprisingly enough, a lot of them seem to care a whole let less about which wireless head-sets their staff uses. A wireless head-set is, by definition, wireless, which means that anyone else in range of the signal can potentially listen in. The same rules as with WiFi apply: If the signal is not encrypted, or the encryption can be trivially broken, you are basically playing broadcast radio station for your neighborhood. All that's needed for the attacker is a 100$ "Scanner" available at every *mart and *shack.
This is by no means a new problem, but one that is still quite prevalent. And I'm not talking about the baby monitors that broadcast your neighbor's kid's annoyance over its first tooth, even though these can be a serious privacy concern, too. I'm talking about hospital, university, corporate wireless head-sets, bought in the cheap, without any regard to what sort of signal and transmission security these products actually use. If this sounds like your firm or institution, it might be a good idea to spend an hour on Monday to google for the products in use and and to find out for sure if your phone equipment acts as a broadcast radio station.
Comments
Sooo many ways to intercept radiowaves (wifi, bluetooth, radio-telephones) ... there's also direct tap on wires. If someone has the goldmine as URL.. let's rock
For my part i start with bluetooth tools available in backtrack distribution.
Any documentation ?
Sep 26th 2010
1 decade ago
No Love.
Sep 27th 2010
1 decade ago
deathweezel
Sep 27th 2010
1 decade ago
deathweezel
Sep 27th 2010
1 decade ago