Threat Category: Network Threats: Bluetooth
ID: LPN-6
Threat Description: BluePrinting occurs when adversaries remotely fingerprint Bluetooth-enabled devices to gather information to potentially exploit at a later point in time.
Threat Origin
Blueprinting 1
Exploit Examples
Not Applicable
CVE Examples
Not Applicable
Possible Countermeasures
To reduce the opportunity for this attack, disable Bluetooth when that feature is not in use
Operate Bluetooth on mobile devices in limited discoverable mode only as long as necessary to achieve desired pairing. See Specification of the Bluetooth System ver. 1.0B 2
References
C. Mulliner and M. Herfurt, “Blueprinting”, 2013; http://trifinite.org/trifinite_stuff_blueprinting.html [accessed 8/24/2016] ↩
Specification of the Bluetooth System version 1.0 B, Bluetooth Special Interest Group, 1999; http://grouper.ieee.org/groups/802/15/Bluetooth/profile_10_b.pdf [accessed 8/24/2016] ↩