Threat Category: Network Threats: Bluetooth
Threat Description: BluePrinting occurs when adversaries remotely fingerprint Bluetooth-enabled devices to gather information to potentially exploit at a later point in time.
To reduce the opportunity for this attack, disable Bluetooth when that feature is not in use
Operate Bluetooth on mobile devices in limited discoverable mode only as long as necessary to achieve desired pairing. See Specification of the Bluetooth System ver. 1.0B 2
C. Mulliner and M. Herfurt, “Blueprinting”, 2013; http://trifinite.org/trifinite_stuff_blueprinting.html [accessed 8/24/2016] ↩
Specification of the Bluetooth System version 1.0 B, Bluetooth Special Interest Group, 1999; http://grouper.ieee.org/groups/802/15/Bluetooth/profile_10_b.pdf [accessed 8/24/2016] ↩