CAPEC-667

Bluetooth Impersonation AttackS (BIAS)
Medio
Alto
Draft
2021-06-24
00h00 +00:00
2022-09-29
00h00 +00:00
Alerta para un CAPEC
Manténgase informado sobre cualquier cambio en un CAPEC específico.
Gestionar notificaciones

Descripciones CAPEC

An adversary disguises the MAC address of their Bluetooth enabled device to one for which there exists an active and trusted connection and authenticates successfully. The adversary can then perform malicious actions on the target Bluetooth device depending on the target’s capabilities.

Informaciones CAPEC

Flujo de ejecución

1) Explore

[Find disguise and target] The adversary starts the Bluetooth service on the attacking device and searches for nearby listening devices.

Técnica
  • Knowledge of a trusted MAC address.
  • Scanning for devices other than the target that may be trusted.
2) Experiment

[Disguise] Using the MAC address of the device the adversary wants to impersonate, they may use a tool such as spooftooth or macchanger to spoof their Bluetooth address and attempt to authenticate with the target.

3) Exploit

[Use device capabilities to accomplish goal] Finally, if authenticated successfully the adversary can perform tasks/information gathering dependent on the target's capabilities and connections.

Prerrequisitos

Knowledge of a target device's list of trusted connections.

Habilidades requeridas

Adversaries must be capable of using command line Linux tools.
Adversaries must be in close proximity to Bluetooth devices.

Mitigaciones

Disable Bluetooth in public places.
Verify incoming Bluetooth connections; do not automatically trust.
Change default PIN passwords and always use one when connecting.

Debilidades relacionadas

CWE-ID Nombre de la debilidad

CWE-290

Authentication Bypass by Spoofing
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Envío

Nombre Organización Fecha Fecha de lanzamiento
CAPEC Content Team The MITRE Corporation 2021-06-24 +00:00

Modificaciones

Nombre Organización Fecha Comentario
CAPEC Content Team The MITRE Corporation 2022-09-29 +00:00 Updated Related_Attack_Patterns