%0 Conference Proceedings %T BlueSnarf Revisited: OBEX FTP Service Directory Traversal %+ Université de Tsukuba = University of Tsukuba %A Moreno, Alberto %A Okamoto, Eiji %Z Part 3: - WCNS 2011 Workshop %< avec comité de lecture %( Lecture Notes in Computer Science %B International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING) %C Valencia, Spain %Y Vicente Casares-Giner %Y Pietro Manzoni %Y Ana Pont %I Springer %3 NETWORKING 2011 Workshops %V LNCS-6827 %P 155-166 %8 2011-05-13 %D 2011 %R 10.1007/978-3-642-23041-7_16 %K Bluetooth %K mobile phones %K exploit %K data theft %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X As mobile operating systems reach the same level of complexity of computer operating systems, these may be affected by the same vulnerabilities and may be subject to the same kind of attacks. Bluetooth provides connectivity to a mobile phone but this network can also be used as a channel to deploy attacks and access its resources, such as personal information, confidential files or the possibility of making phone calls and consume the user’s balance. When the first attacks to early Bluetooth mobile phones came up, manufacturers were forced to raise awareness about Bluetooth and make improvements in the security of the implementation. In spite of the improvements, we introduce a multi-platform vulnerability for mobile phones that allows a remote attacker to list arbitrary directories, and read and write arbitrary files via Bluetooth. Our experience shows that the attack can be performed in a real environment and it may lead to data theft. %G English %Z TC 6 %2 https://inria.hal.science/hal-01587858/document %2 https://inria.hal.science/hal-01587858/file/978-3-642-23041-7_16_Chapter.pdf %L hal-01587858 %U https://inria.hal.science/hal-01587858 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC6 %~ IFIP-NETWORKING %~ IFIP-LNCS-6827