Bluesnarfing software for pc

broken image

The attackers normally use some software to do BlueSnarfing. Then they pair with those devices without the user’s consent. In BlueSnarfing, the attacker first scans for Bluetooth enabled devices, especially in public places. BlueSnarfing uses security vulnerabilities of that protocol. This attack is perpetrated without the victim’s knowledge.īluetooth enabled devices to communicate with each other using a protocol called OBEX or OBject Exchange. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs) and other devices.

broken image

Bluesnarfing is the theft of information from the target device or the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, and laptops.