TY - JOUR
T1 - Direct attacks on mobile phones by bluetooth for forensic analysis
AU - Martínez, Beatriz López
AU - García, Marcos Arturo Rosales
AU - Pérez, Gabriel Sánchez
AU - Torres, Gualberto Aguilar
AU - Medina, Linda Karina Toscano
PY - 2011
Y1 - 2011
N2 - Nowadays users demand sophisticated applications and services on their mobile phones since they have become a basic necessity for everyday life. The Symbian operating system has the features outlined earlier and provides a security and data protection module, besides it is one of the world market leader in mobile phones. The attacks described here were made through 'Bluetooth technology', and its importance lies in the ease of operation for any user, but this also represents risks and vulnerabilities that threaten the security mechanisms offered by different mobile phones. This research used direct attacks on Bluetooth communication to violate such mechanisms. The techniques used are well-known hacking practices like Bluejacking, Bluebug, Bluesnarfing and Blueprinting for Nokia GSM smart phones. The results show evidence that can be obtained from mobile phones which allows the forensic investigator to have solid basis to determine that an attack was successfully done and what kind of information was removed or copied from the mobile phone. The main purpose of this research is to provide forensic investigators with evidence to detect mobile phones violated by direct attacks using a methodology for forensic analysis based on NIST SP 800-86.
AB - Nowadays users demand sophisticated applications and services on their mobile phones since they have become a basic necessity for everyday life. The Symbian operating system has the features outlined earlier and provides a security and data protection module, besides it is one of the world market leader in mobile phones. The attacks described here were made through 'Bluetooth technology', and its importance lies in the ease of operation for any user, but this also represents risks and vulnerabilities that threaten the security mechanisms offered by different mobile phones. This research used direct attacks on Bluetooth communication to violate such mechanisms. The techniques used are well-known hacking practices like Bluejacking, Bluebug, Bluesnarfing and Blueprinting for Nokia GSM smart phones. The results show evidence that can be obtained from mobile phones which allows the forensic investigator to have solid basis to determine that an attack was successfully done and what kind of information was removed or copied from the mobile phone. The main purpose of this research is to provide forensic investigators with evidence to detect mobile phones violated by direct attacks using a methodology for forensic analysis based on NIST SP 800-86.
KW - Bluebug
KW - Bluejacking
KW - Blueprinting
KW - Bluesnarfing
KW - Bluetooth
KW - Forensics pairing
KW - Mobile
KW - Symbian os
UR - http://www.scopus.com/inward/record.url?scp=83455170777&partnerID=8YFLogxK
U2 - 10.5897/SRE10.1098
DO - 10.5897/SRE10.1098
M3 - Artículo
SN - 1992-2248
VL - 6
SP - 6254
EP - 6261
JO - Scientific Research and Essays
JF - Scientific Research and Essays
IS - 30
ER -