William is an attacker who is attempting to hack Bluetooth-enabled devices at public places. Within the target’s range, he used special software to obtain the data stored in the victim’s device. He used a technique that exploits the vulnerability in the OBject Exchange (OBEX) protocol that Bluetooth uses to exchange information.

William is an attacker who is attempting to hack Bluetooth-enabled devices at public places. Within the target’s range, he used special software to obtain the data stored in the victim’s device. He used a technique that exploits the vulnerability in the OBject Exchange (OBEX) protocol that Bluetooth uses to exchange information.

Identify the attack performed by William in the above scenario.
A . Bluesmacking
B . Bluesnarfing
C . Bluebugging
D . Bluejacking

Answer: B

Explanation:

William performed the Bluesnarfing attack. Bluesnarfing is a technique where an attacker exploits a vulnerability in the OBject Exchange (OBEX) protocol used by Bluetooth to exchange information. By doing so, the attacker gains unauthorized access to data stored on the victim’s Bluetooth-enabled device.

Reference: EC-Council Certified Security Specialist (E|CSS) documents and study guide.

EC-Council Certified Security Specialist (E|CSS) course materials1234

Latest ECSS Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments