im trying to figure this one out ...

http://www.bluestumbler.org/

ive been able to sniff my t68i out with bluez tools (hcitools), bluesniff,
redfang, btscanner, etc, but can't figure out the part in which the
backdoors + snarfing can be openly available for file transfers ...

does anyone know more about this?  (or more specifically know what hci
commands + events might be used in this type of attack?)

- jon

pgp key: http://www.jonbaer.net/jonbaer.asc
fingerprint: F438 A47E C45E 8B27 F68C 1F9B 41DB DB8B 9A0C AF47

--
NYCwireless - http://www.nycwireless.net/
Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
Archives: http://lists.nycwireless.net/pipermail/nycwireless/

Reply via email to