I'm curious if anyone's ever used Bloover and how they find it? Interesting concept and I wonder how much is actually being done for this "backdoor" into enterprises.. :confused:
Printable View
I'm curious if anyone's ever used Bloover and how they find it? Interesting concept and I wonder how much is actually being done for this "backdoor" into enterprises.. :confused:
I had a play around with it when I first got a Bluetooth enabled phone 12 months ago, but didn't find any vulnerable devices after a month or so and erased it. It seems even here in Aussie-land the Bluetooth spec has been tightened as I've read some scary security articles on just how insecure it was and the amount of personal data that could be obtained.
Niggles.
Btw just a note - if you want to play around with that stuff backtrack2 has BT tools like that