Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Module 1: BSWJ: Crackle
Wireless communication technologies could not exist without the use of Bluetooth as the preferred short-range wireless protocol system. Having admitted to Bluetooth’s popularity and open accessibility, the system is a little too open – with security issues that preclude secure connections, if we are being frank with you. Yes, Bluetooths can be listened to easily by and through unauthorized parties, making Bluetooth technology in general a target for hacking and security attacks and issues.
Bluetooth technology is found literally everywhere anyone could snap a finger. It is seen in:
- Mouse for keyboards
- Portable speakers
- Car speaker devices
The bad news is that any sensitive or confidential conversation occurring over a Bluetooth device will always be open season, for a security breach by an unwanted or unauthorized person who is definitely interested in what is being said. Why is this important to know? Because if an organization is aware of how super easy user technology such as Bluetooth can be exploited by the wrong parties, then the organization is in the best position to do something about it to prevent losses and hacking into its private organizational data.
That being said, there are times that your security team needs to break into secure Bluetooth communication systems to manage encryption to reveal disguised content to bring to light through uncovering the plain text of the message. Said more plainly, your IT will more than likely have success using Crackle to reverse the process of a BLE (Bluetooth Low Energy) device using Link Layer Encryption alongside legacy pairing.
How might you use Crackle? Well, your IT department will definitely appreciate having the Crackle tools onboard to gain access to acquire and capture data passed through a SmartPhone or PC. Here’s what you are going to get – you’re going to like this. Crackle can “crack” the LE Legacy Pairing Key exchange in real time.
The reason you might use Crackle is that Crackle is an assist tool to help identify devices utilizing LE secure connections or BLE of the parties to a Bluetooth connection. In this way, you will be able to manage the process of ideation at your organization by using Crackle when you know it is going to be necessary to take out a brute force tool to listen in on clear and present, as well as future connections of interest between two Bluetooth devices. Crackle is ready for the task and will assist the management of these communications whenever called upon to do so at your organization.
Teaching Assistant Vikramajeet Khatri
(Disclaimer: Breaking Stuff with Joe is a Cybrary series that will be running indefinitely. You will not earn CEU/CPE hours by watching any individual 'Breaking Stuff with Joe' episode. However, you can still earn a certificate of completion for each episode completed.)