im trying to figure this one out ... http://www.bluestumbler.org/
ive been able to sniff my t68i out with bluez tools (hcitools), bluesniff, redfang, btscanner, etc, but can't figure out the part in which the backdoors + snarfing can be openly available for file transfers ... does anyone know more about this? (or more specifically know what hci commands + events might be used in this type of attack?) - jon pgp key: http://www.jonbaer.net/jonbaer.asc fingerprint: F438 A47E C45E 8B27 F68C 1F9B 41DB DB8B 9A0C AF47 -- NYCwireless - http://www.nycwireless.net/ Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/ Archives: http://lists.nycwireless.net/pipermail/nycwireless/
