[Discuss] A Little OT: The Password Post-It
Richard Pieri
richard.pieri at gmail.com
Wed Apr 18 20:15:40 EDT 2012
Regarding the Bluetooth proximity unlock, there is a way to exploit such a system without the victim ever being without his fob. It's a simple exploit. Car thieves have been using it for several years with RFID-based start and unlock fobs: use a pair of transceivers to extend the RFID range. In networking terms, the paired transceivers form a bridge between car and fob.
A similar attack against a Bt proximity unlock could work the same way. The transceivers need to be a little more sophisticated to handle the frequency hopping that Bt uses but that isn't difficult: just gang together enough transceivers to handle the full spectrum and run them in parallel.
--Rich P.
More information about the Discuss
mailing list