. . "Bluesnarfing"@it . . "Bluesnarfing"@en . "6531"^^ . . "Bluesnarfing is het misbruiken van de tekortkomingen van de authenticatie en/of datatransfermechanisme van bluetooth waardoor persoonlijke data benaderd kan worden. Voor sommige mobiele telefoons geldt dat als de gebruiker bluetooth aan heeft staan, anoniem data uit het adresboek, de kalender en het IMEI-nummer van de telefoon kan worden gehaald. Bij andere toestellen is het mogelijk om de complete inhoud van het geheugen te benaderen, waardoor media-bestanden en tekstberichten toegankelijk zijn. Als laatste is het soms mogelijk om via de AT-commandoset, volledige toegang te krijgen tot een 'hoger' level van commando's en kanalen zoals 'voice' en 'messaging'. Op het internet circuleren diverse tools en exploits om een Snarf-attack mee uit te voeren. Begin 2004 bleken bepaalde gsm's van Nokia en Sony Ericsson kwetsbaar voor een bluetooth-aanval waarbij een aanvaller toegang kreeg tot het adresboek. De hacker zou daarbij zelfs ongezien gegevens kunnen aanpassen. Het beveiligingsbedrijf AL Digital maakte bekend dat minstens 10 toestellen van Nokia en Sony Ericsson kwetsbaar waren voor een bluesnarfing-aanval. De problemen deden zich onder andere voor bij de Nokia 6310, de 8910 en de 8910i. Tegelijkertijd bevestigde Nokia ook dat hun 6310i kwetsbaar is voor een denial-of-serviceaanval via bluetooth. Een speciaal gefabriceerd bluetooth-bericht dat naar het toestel wordt gestuurd kan de 6310i opdracht geven zichzelf te herstarten. Sony Ericsson bracht heel snel een update voor zijn telefoons uit, maar Nokia vond de kwestie niet zo gevaarlijk. Er zijn namelijk bepaalde voorwaarden die vervuld moeten worden vooraleer de aanval lukt. Niet iedereen heeft bluetooth aanstaan en bovendien lukt zo'n aanval maar van op maximaal een tiental meters afstand. Toch zijn er online steeds meer tools te vinden om bluesnarfing uit te voeren, bevestigen experts."@nl . . . "1263239"^^ . . . . . . . . . . . . "Bluesnarfing je technika neopr\u00E1vn\u011Bn\u00E9ho z\u00EDsk\u00E1v\u00E1n\u00EDm dat prost\u0159ednictv\u00EDm technologie Bluetooth. Nej\u010Dast\u011Bji je \u00FAtok sm\u011Brov\u00E1n na p\u0159enosn\u00E1 za\u0159\u00EDzen\u00ED, nap\u0159. notebooky, palmtopy, smartphony nebo mobiln\u00ED telefony. Princip \u00FAtoku spo\u010D\u00EDv\u00E1 ve vyu\u017Eit\u00ED slu\u017Eby OBEX Push, kter\u00E1 je nej\u010Dast\u011Bji vyu\u017E\u00EDv\u00E1na k p\u0159\u00EDjmu a odes\u00EDl\u00E1n\u00ED vizitek vCard. Pokud za\u0159\u00EDzen\u00ED umo\u017E\u0148uje vy\u017E\u00E1d\u00E1n\u00ED souboru p\u0159es slu\u017Ebu OBEX Get, m\u016F\u017Ee \u00FAto\u010Dn\u00EDk z\u00EDskat p\u0159\u00EDstup k soubor\u016Fm a tyto si st\u00E1hnout do sv\u00E9ho za\u0159\u00EDzen\u00ED. N\u011Bkter\u00E1 za\u0159\u00EDzen\u00ED podporuj\u00ED tak\u00E9 p\u0159\u00EDstup pro z\u00E1pis souboru. Prov\u00E1d\u011Bn\u00ED bluesnarfingu je z\u00E1sahem do soukrom\u00ED a je v mnoha zem\u00EDch neleg\u00E1ln\u00ED. Ob\u010Das je bluesnarfing myln\u011B zam\u011B\u0148ov\u00E1n s bluejackingem (zas\u00EDl\u00E1n\u00ED zpr\u00E1v pomoc\u00ED technologie Bluetooth), co\u017E na bluejacking vrh\u00E1 \u0161patn\u00FD st\u00EDn. Mo\u017Enost proveden\u00ED Bluesnarfingu objevil v listopadu 2003 Adam Laurie z britsk\u00E9 bezpe\u010Dnostn\u00ED firmy AL Digital."@cs . "Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant). This allows access to calendars, contact lists, emails and text messages, and on some phones, users can copy pictures and private videos. Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge. While Bluejacking is essentially harmless as it only transmits data to the target device, Bluesnarfing is the theft of information from the target device."@en . . . "Bluesnarfing"@fr . . "Bluesnarfing es el acceso no autorizado a informaci\u00F3n de un dispositivo m\u00F3vil por medio de una conexi\u00F3n Bluetooth normalmente entre tel\u00E9fonos, ordenadores de sobremesa o port\u00E1tiles y PDAs (Asistente Digital Personal).\u200B Esto permite el acceso a calendarios, lista de contactos, correos electr\u00F3nicos y mensajes de texto, en algunos tel\u00E9fonos m\u00F3viles, los usuarios pueden incluso copiar fotos o v\u00EDdeos privados. Tanto Bluesnarfing como Bluejacking se aprovechan de las conexiones Bluetooth de terceros sin su conocimiento. Mientras que el Bluejacking es esencialmente inofensivo ya que solamente transfiere datos, el Bluesnarfing es el robo de informaci\u00F3n del dispositivo que es objetivo del ataque.\u200B"@es . . . . . . "Bluesnarfing je technika neopr\u00E1vn\u011Bn\u00E9ho z\u00EDsk\u00E1v\u00E1n\u00EDm dat prost\u0159ednictv\u00EDm technologie Bluetooth. Nej\u010Dast\u011Bji je \u00FAtok sm\u011Brov\u00E1n na p\u0159enosn\u00E1 za\u0159\u00EDzen\u00ED, nap\u0159. notebooky, palmtopy, smartphony nebo mobiln\u00ED telefony. Princip \u00FAtoku spo\u010D\u00EDv\u00E1 ve vyu\u017Eit\u00ED slu\u017Eby OBEX Push, kter\u00E1 je nej\u010Dast\u011Bji vyu\u017E\u00EDv\u00E1na k p\u0159\u00EDjmu a odes\u00EDl\u00E1n\u00ED vizitek vCard. Pokud za\u0159\u00EDzen\u00ED umo\u017E\u0148uje vy\u017E\u00E1d\u00E1n\u00ED souboru p\u0159es slu\u017Ebu OBEX Get, m\u016F\u017Ee \u00FAto\u010Dn\u00EDk z\u00EDskat p\u0159\u00EDstup k soubor\u016Fm a tyto si st\u00E1hnout do sv\u00E9ho za\u0159\u00EDzen\u00ED. N\u011Bkter\u00E1 za\u0159\u00EDzen\u00ED podporuj\u00ED tak\u00E9 p\u0159\u00EDstup pro z\u00E1pis souboru."@cs . . "Bluesnarfing"@sv . . . "Bluesnarfing"@nl . . "Bluesnarfing ist eine spezielle Form von Snarfing \u00FCber eine Bluetooth-Verbindung, oftmals von Mobiltelefonen unter Verwendung eines anderen Mobiltelefons, Computers, Laptops oder PDAs. Bluesnarfing erlaubt den Zugang auf den Kalender, das Adressbuch, E-Mails und Textmitteilungen. Es ist ein gr\u00F6\u00DFeres Problem als Bluejacking. Programme wie Blooover nutzen ohne Wissen des Anwenders eine Sicherheitsl\u00FCcke aus. Jedes Ger\u00E4t, das die Bluetooth-Verbindung eingeschaltet hat und auf \u201Ef\u00FCr Andere sichtbar\u201C eingestellt ist, kann angegriffen werden. Bei ausgeschalteter Sichtbarkeitsfunktion ist das betreffende Ger\u00E4t vor Bluesnarfing etwas besser gesch\u00FCtzt, Sicherheit gew\u00E4hrleistet jedoch nur eine Deaktivierung der Bluetoothfunktion. Bluesnarfing greift in die Privatsph\u00E4re ein und ist in vielen L\u00E4ndern illegal. Entdeckt wurde die M\u00F6glichkeit des \u201EBluesnarfing\u201C im November 2003 durch Adam Laurie von A.L. Digital, einer englischen Sicherheitsfirma. Es basiert auf einem Fehler im Object-Exchange(OBEX)-Protokoll von Bluetooth."@de . "Bluesnarfing - technika nieuprawnionego zdobywania danych za po\u015Brednictwem Bluetooth. Najcz\u0119\u015Bciej osoby zajmuj\u0105ce si\u0119 bluesnarfingiem korzystaj\u0105 z przeno\u015Bnych urz\u0105dze\u0144, tj. laptop, palmtop, smartfon, telefon kom\u00F3rkowy."@pl . . . . . "\uBE14\uB8E8\uC2A4\uB098\uD551(\uC601\uC5B4: bluesnarfing)\uC740 \uBE14\uB8E8\uD22C\uC2A4 \uC5F0\uACB0\uC744 \uD1B5\uD574 \uC5D0\uC11C \uBB34\uB2E8\uC73C\uB85C \uC815\uBCF4\uC5D0 \uC561\uC138\uC2A4\uD558\uB294 \uAC83\uC744 \uB9D0\uD558\uBA70, \uC8FC\uB85C \uD734\uB300\uC804\uD654, \uB7A9\uD1B1, \uB370\uC2A4\uD06C\uD1B1, PDA \uB4F1\uC758 \uBB34\uC120 \uC7A5\uCE58\uC5D0\uC11C \uC774\uB8E8\uC5B4\uC9C4\uB2E4. \uC774\uB97C \uD1B5\uD574 \uC774\uBA54\uC77C\uACFC \uD14D\uC2A4\uD2B8 \uBA54\uC2DC\uC9C0, \uC5F0\uB77D\uCC98 \uBAA9\uB85D, \uCE98\uB9B0\uB354\uC5D0 \uC561\uC138\uC2A4\uB97C \uD560 \uC218 \uC788\uC73C\uBA70, \uC77C\uBD80 \uC804\uD654\uC758 \uACBD\uC6B0 \uC0AC\uC9C4\uACFC \uBE44\uB514\uC624\uB97C \uBCF5\uC0AC\uD560 \uC218 \uC788\uB2E4. \uBE14\uB8E8\uC2A4\uB098\uD551\uACFC \uBE14\uB8E8\uC7AC\uD0B9 \uBAA8\uB450 \uB2E4\uB978 \uC0AC\uB78C\uC758 \uBE14\uB8E8\uD22C\uC2A4 \uC5F0\uACB0\uC744 \uC545\uC6A9\uD558\uBA70, \uD754\uC801\uC744 \uB0A8\uAE30\uC9C0 \uC54A\uB294\uB2E4. \uBE14\uB8E8\uC7AC\uD0B9\uC740 \uB300\uC0C1 \uC7A5\uCE58\uC5D0 \uB370\uC774\uD130\uB97C \uC804\uC1A1\uD558\uAE30\uB9CC \uD558\uBBC0\uB85C \uD070 \uD53C\uD574\uB294 \uC5C6\uC9C0\uB9CC, \uBE14\uB8E8\uC2A4\uB098\uD551\uC740 \uB300\uC0C1 \uC7A5\uCE58\uC5D0\uC11C \uC815\uBCF4\uB97C \uD6D4\uCE58\uB294 \uAC83\uC774\uB2E4. \uACF5\uACA9\uC790\uB294 OBEX Push Profile (OPP)\uC744 \uC0AC\uC6A9\uD558\uBA70, \uB300\uBD80\uBD84 \uC778\uC99D\uC774 \uD544\uC694\uD558\uC9C0 \uC54A\uB2E4. \uACF5\uACA9\uC740 OBEX Get Request\uB85C .vcf \uD30C\uC77C (\uC8FC\uC18C\uB85D) \uB610\uB294 .vcs\uD30C\uC77C (\uB2EC\uB825)\uACFC \uAC19\uC774 \uC798 \uC54C\uB824\uC9C4 \uD30C\uC77C \uD655\uC7A5\uC790\uB85C \uBCF4\uB0B8\uB2E4. \uB9CC\uC57D \uD574\uB2F9 \uAE30\uAE30\uC758 \uD38C\uC6E8\uC5B4\uC5D0 \uBC84\uADF8\uAC00 \uC788\uB2E4\uBA74 \uACF5\uACA9\uC790\uB294 \uC0AC\uC6A9\uC790\uC758 \uAE30\uAE30\uC758 \uBAA8\uB4E0 \uD30C\uC77C\uC5D0 \uC811\uADFC\uD560 \uC218 \uC788\uB2E4. \uBE14\uB8E8\uC2A4\uB098\uD551\uC740 \uC0AC\uC0DD\uD65C \uCE68\uD574\uC774\uAE30 \uB54C\uBB38\uC5D0 \uB300\uBD80\uBD84\uC758 \uB098\uB77C\uC5D0\uC11C \uBD88\uBC95\uC774\uB2E4."@ko . . . . . . "Bluesnarfing"@de . . . "1106284301"^^ . . "Bluesnarfing es el acceso no autorizado a informaci\u00F3n de un dispositivo m\u00F3vil por medio de una conexi\u00F3n Bluetooth normalmente entre tel\u00E9fonos, ordenadores de sobremesa o port\u00E1tiles y PDAs (Asistente Digital Personal).\u200B Esto permite el acceso a calendarios, lista de contactos, correos electr\u00F3nicos y mensajes de texto, en algunos tel\u00E9fonos m\u00F3viles, los usuarios pueden incluso copiar fotos o v\u00EDdeos privados. Tanto Bluesnarfing como Bluejacking se aprovechan de las conexiones Bluetooth de terceros sin su conocimiento. Mientras que el Bluejacking es esencialmente inofensivo ya que solamente transfiere datos, el Bluesnarfing es el robo de informaci\u00F3n del dispositivo que es objetivo del ataque.\u200B El software de m\u00F3vil actual normalmente debe permitir una conexi\u00F3n mediante un estado temporal iniciado por el usuario para poder \u201Cemparejarse\u201D con otro dispositivo para copiar contenido. Parece que hubo, en el pasado, informes de tel\u00E9fonos m\u00F3viles siendo Bluesnarfed sin el emparejamiento siendo expl\u00EDcitamente permitido. Despu\u00E9s del descubrimiento y la divulgaci\u00F3n de esta vulnerabilidad, los proveedores de dispositivos m\u00F3viles parchearon sus implementaciones de Bluetooth. Cualquier dispositivo con su conexi\u00F3n de Bluetooth encendida y configurada como \u201Cvisible\u201D (que puede ser encontrado por otros dispositivos Bluetooth) puede ser susceptible a Bluejacking y en cierto modo a Bluesnarfing si el software del proveedor es vulnerable. Apagando esta caracter\u00EDstica, la potencial v\u00EDctima puede disminuir el riesgo de ser Bluesnarfed; sin embargo un dispositivo configurado como \u201Coculto\u201D puede ser Bluesnarfable si se adivina la direcci\u00F3n MAC del dispositivo por medio de un ataque de fuerza bruta. El principal obst\u00E1culo para este ataque es el gran n\u00FAmero de direcciones MAC. Bluetooth utiliza una direcci\u00F3n MAC \u00FAnica de 48 bits, de los cuales los 24 primeros son comunes a un mismo fabricante.\u200B Los 24 restantes tienen aproximadamente 16,8 millones de combinaciones posibles, lo que requiere un promedio de 8,4 millones de intentos para adivinarlos por fuerza bruta. Los ataques a sistemas inal\u00E1mbricos han aumentado junto con la popularidad de redes inal\u00E1mbricas. Los atacantes normalmente buscan puntos de acceso o dispositivos inal\u00E1mbricos no autorizados instalados en la red de una organizaci\u00F3n que permiten que el atacante eluda la seguridad de esta. Los puntos de acceso no autorizados y las redes inal\u00E1mbricas de f\u00E1cil acceso para terceros a menudo se detectan a trav\u00E9s de wardriving, que utiliza un autom\u00F3vil u otro medio de transporte para buscar una se\u00F1al inal\u00E1mbrica en un \u00E1rea grande. El Bluesnarfing es un ataque con el fin de acceder a informaci\u00F3n de dispositivos m\u00F3viles que se transmite usando el protocolo Bluetooth. Con los dispositivos m\u00F3viles, este tipo de ataque se utiliza a menudo para hacerse con la Identidad Internacional de Equipo M\u00F3vil (IMEI). El acceso a este c\u00F3digo \u00FAnico permite al atacante desviar las llamadas telef\u00F3nicas y los mensajes a otro dispositivo sin el conocimiento del usuario. Los proveedores de Bluetooth aconsejan a los clientes con dispositivos vulnerables que los apaguen en \u00E1reas consideradas inseguras o que los configuren como \u201Coculto\u201D.\u200B Esta configuraci\u00F3n permite a los usuarios mantener su Bluetooth activado para poder usar productos compatibles o de confianza mientras que otros dispositivos no pueden localizarlos. Debido a que Bluesnarfing es una invasi\u00F3n de la privacidad, es ilegal en muchos pa\u00EDses."@es . "Bluesnarfing inneb\u00E4r att man med hj\u00E4lp av en enhet utrustad med bluetooth kan ladda ner n\u00E5gons telefonbok, bilder och liknande. Offret m\u00E4rker ingenting. Man kan \u00E4ven f\u00E5 offrets telefon att ringa upp ett nummer eller skicka ett sms."@sv . "Bluesnarfing"@es . . . . . . "Bluesnarfing ist eine spezielle Form von Snarfing \u00FCber eine Bluetooth-Verbindung, oftmals von Mobiltelefonen unter Verwendung eines anderen Mobiltelefons, Computers, Laptops oder PDAs. Bluesnarfing erlaubt den Zugang auf den Kalender, das Adressbuch, E-Mails und Textmitteilungen. Es ist ein gr\u00F6\u00DFeres Problem als Bluejacking. Programme wie Blooover nutzen ohne Wissen des Anwenders eine Sicherheitsl\u00FCcke aus. Jedes Ger\u00E4t, das die Bluetooth-Verbindung eingeschaltet hat und auf \u201Ef\u00FCr Andere sichtbar\u201C eingestellt ist, kann angegriffen werden. Bei ausgeschalteter Sichtbarkeitsfunktion ist das betreffende Ger\u00E4t vor Bluesnarfing etwas besser gesch\u00FCtzt, Sicherheit gew\u00E4hrleistet jedoch nur eine Deaktivierung der Bluetoothfunktion. Bluesnarfing greift in die Privatsph\u00E4re ein und ist in vielen L\u00E4ndern il"@de . . . "Bluesnarfing is het misbruiken van de tekortkomingen van de authenticatie en/of datatransfermechanisme van bluetooth waardoor persoonlijke data benaderd kan worden. Voor sommige mobiele telefoons geldt dat als de gebruiker bluetooth aan heeft staan, anoniem data uit het adresboek, de kalender en het IMEI-nummer van de telefoon kan worden gehaald. Bij andere toestellen is het mogelijk om de complete inhoud van het geheugen te benaderen, waardoor media-bestanden en tekstberichten toegankelijk zijn. Als laatste is het soms mogelijk om via de AT-commandoset, volledige toegang te krijgen tot een 'hoger' level van commando's en kanalen zoals 'voice' en 'messaging'. Op het internet circuleren diverse tools en exploits om een Snarf-attack mee uit te voeren."@nl . "Bluesnarfing \u00E8 il nome che identifica la tecnica e il tool di sicurezza utilizzato per accedere senza autorizzazione ad informazioni private contenute all'interno di un cellulare o di un PDA o di un qualsivoglia apparecchio che permetta l'utilizzo di una connessione bluetooth. Poich\u00E9 il Bluesnarfing rappresenta una violazione della privacy, questo tipo di attacco risulta illegale in molte nazioni."@it . . . . . . "Bluesnarfing inneb\u00E4r att man med hj\u00E4lp av en enhet utrustad med bluetooth kan ladda ner n\u00E5gons telefonbok, bilder och liknande. Offret m\u00E4rker ingenting. Man kan \u00E4ven f\u00E5 offrets telefon att ringa upp ett nummer eller skicka ett sms."@sv . . "Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant). This allows access to calendars, contact lists, emails and text messages, and on some phones, users can copy pictures and private videos. Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge. While Bluejacking is essentially harmless as it only transmits data to the target device, Bluesnarfing is the theft of information from the target device."@en . . "Le bluesnarfing est le nom donn\u00E9 \u00E0 une technique de piratage des informations contenues dans un appareil utilisant une connexion Bluetooth (tels qu'un t\u00E9l\u00E9phone portable, un ordinateur portable ou un PDA). Cette technique ne laisse pas de traces. Elle permet \u00E9galement d'ajouter des informations (contacts dans le r\u00E9pertoire par exemple). L'attaque peut se faire \u00E0 partir d'un ordinateur mais \u00E9galement \u00E0 l'aide d'un GSM bluetooth compatible et un logiciel en java. Certains t\u00E9l\u00E9phones seraient plus sensibles \u00E0 ce genre d'attaque (Sony Ericsson T68i, Nokia 6310i...), bien que tout appareil disposant d\u2019une connexion Bluetooth r\u00E9gl\u00E9e sur publique (c\u2019est-\u00E0-dire pouvant \u00EAtre d\u00E9couverte par d\u2019autres appareils dans le secteur) puisse \u00EAtre victime de ce type d\u2019attaque. Le logiciel Bluetooth Control qui s'installe sur un simple t\u00E9l\u00E9phone portable permet notamment d'exploiter cette faille[r\u00E9f. n\u00E9cessaire] du Bluetooth."@fr . . "Bluesnarfing"@cs . . . "Bluesnarfing - technika nieuprawnionego zdobywania danych za po\u015Brednictwem Bluetooth. Najcz\u0119\u015Bciej osoby zajmuj\u0105ce si\u0119 bluesnarfingiem korzystaj\u0105 z przeno\u015Bnych urz\u0105dze\u0144, tj. laptop, palmtop, smartfon, telefon kom\u00F3rkowy. Osoba pr\u00F3buj\u0105ca uzyska\u0107 dost\u0119p do danych w innym urz\u0105dzeniu wysy\u0142a ofierze wiadomo\u015B\u0107 za po\u015Brednictwem Bluetooth, najcz\u0119\u015Bciej jako wizyt\u00F3wk\u0119 w formacie vCard. Odbiorca dostaje wiadomo\u015B\u0107 (bez potwierdzenia zgody na odbi\u00F3r), a jej tekst cz\u0119sto automatycznie pojawia si\u0119 na ekranie (np. \"Problemy sieciowe. Wpisz pin 1234\"). Nast\u0119pnie napastnik w\u0142\u0105cza odpowiedni\u0105 aplikacj\u0119 pozwalaj\u0105c\u0105 na zdalny dost\u0119p do innej maszyny wyposa\u017Conej w Bluetooth po wpisaniu tego samego PIN-u, kt\u00F3ry wys\u0142any zosta\u0142 w wiadomo\u015Bci. Ofiara, wpisuj\u0105c ten numer, mo\u017Ce narazi\u0107 si\u0119 na utrat\u0119 danych."@pl . "\uBE14\uB8E8\uC2A4\uB098\uD551(\uC601\uC5B4: bluesnarfing)\uC740 \uBE14\uB8E8\uD22C\uC2A4 \uC5F0\uACB0\uC744 \uD1B5\uD574 \uC5D0\uC11C \uBB34\uB2E8\uC73C\uB85C \uC815\uBCF4\uC5D0 \uC561\uC138\uC2A4\uD558\uB294 \uAC83\uC744 \uB9D0\uD558\uBA70, \uC8FC\uB85C \uD734\uB300\uC804\uD654, \uB7A9\uD1B1, \uB370\uC2A4\uD06C\uD1B1, PDA \uB4F1\uC758 \uBB34\uC120 \uC7A5\uCE58\uC5D0\uC11C \uC774\uB8E8\uC5B4\uC9C4\uB2E4. \uC774\uB97C \uD1B5\uD574 \uC774\uBA54\uC77C\uACFC \uD14D\uC2A4\uD2B8 \uBA54\uC2DC\uC9C0, \uC5F0\uB77D\uCC98 \uBAA9\uB85D, \uCE98\uB9B0\uB354\uC5D0 \uC561\uC138\uC2A4\uB97C \uD560 \uC218 \uC788\uC73C\uBA70, \uC77C\uBD80 \uC804\uD654\uC758 \uACBD\uC6B0 \uC0AC\uC9C4\uACFC \uBE44\uB514\uC624\uB97C \uBCF5\uC0AC\uD560 \uC218 \uC788\uB2E4. \uBE14\uB8E8\uC2A4\uB098\uD551\uACFC \uBE14\uB8E8\uC7AC\uD0B9 \uBAA8\uB450 \uB2E4\uB978 \uC0AC\uB78C\uC758 \uBE14\uB8E8\uD22C\uC2A4 \uC5F0\uACB0\uC744 \uC545\uC6A9\uD558\uBA70, \uD754\uC801\uC744 \uB0A8\uAE30\uC9C0 \uC54A\uB294\uB2E4. \uBE14\uB8E8\uC7AC\uD0B9\uC740 \uB300\uC0C1 \uC7A5\uCE58\uC5D0 \uB370\uC774\uD130\uB97C \uC804\uC1A1\uD558\uAE30\uB9CC \uD558\uBBC0\uB85C \uD070 \uD53C\uD574\uB294 \uC5C6\uC9C0\uB9CC, \uBE14\uB8E8\uC2A4\uB098\uD551\uC740 \uB300\uC0C1 \uC7A5\uCE58\uC5D0\uC11C \uC815\uBCF4\uB97C \uD6D4\uCE58\uB294 \uAC83\uC774\uB2E4. \uACF5\uACA9\uC790\uB294 OBEX Push Profile (OPP)\uC744 \uC0AC\uC6A9\uD558\uBA70, \uB300\uBD80\uBD84 \uC778\uC99D\uC774 \uD544\uC694\uD558\uC9C0 \uC54A\uB2E4. \uACF5\uACA9\uC740 OBEX Get Request\uB85C .vcf \uD30C\uC77C (\uC8FC\uC18C\uB85D) \uB610\uB294 .vcs\uD30C\uC77C (\uB2EC\uB825)\uACFC \uAC19\uC774 \uC798 \uC54C\uB824\uC9C4 \uD30C\uC77C \uD655\uC7A5\uC790\uB85C \uBCF4\uB0B8\uB2E4. \uB9CC\uC57D \uD574\uB2F9 \uAE30\uAE30\uC758 \uD38C\uC6E8\uC5B4\uC5D0 \uBC84\uADF8\uAC00 \uC788\uB2E4\uBA74 \uACF5\uACA9\uC790\uB294 \uC0AC\uC6A9\uC790\uC758 \uAE30\uAE30\uC758 \uBAA8\uB4E0 \uD30C\uC77C\uC5D0 \uC811\uADFC\uD560 \uC218 \uC788\uB2E4. \uD604\uC7AC \uBAA8\uBC14\uC77C \uC18C\uD504\uD2B8\uC6E8\uC5B4\uC5D0\uC11C\uB294 \uC77C\uBC18\uC801\uC73C\uB85C \uC0AC\uC6A9\uC790\uAC00 \uC2DC\uC791\uD55C \uC784\uC2DC \uD5C8\uC6A9 \uC0C1\uD0DC\uB97C \uC0AC\uC6A9\uD558\uACE0, \uCF58\uD150\uCE20\uB97C \uBCF5\uC0AC\uD558\uAE30 \uC704\uD574 \uB2E4\uB978 \uC7A5\uCE58\uC640 \uD558\uAE30 \uC704\uD55C \uC5F0\uACB0\uC744 \uD5C8\uC6A9\uD574\uC57C \uD55C\uB2E4. \uACFC\uAC70\uC5D0\uB294 \uAE30\uAE30\uAC00 \uBA85\uC2DC\uC801\uC73C\uB85C \uD398\uC5B4\uB9C1\uB418\uC9C0 \uC54A\uC544 \uBE14\uB8E8\uC2A4\uB098\uD551\uC774 \uAC00\uB2A5\uD588\uB358 \uAC83\uC73C\uB85C \uBCF4\uC778\uB2E4. \uC774 \uCDE8\uC57D\uC810\uC774 \uC54C\uB824\uC9C4 \uD6C4 \uD734\uB300\uC804\uD654 \uD310\uB9E4\uC5C5\uCCB4\uB4E4\uC740 \uBE14\uB8E8\uD22C\uC2A4 \uCDE8\uC57D\uC810 \uBCF4\uC644\uC744 \uC644\uB8CC\uD588\uC73C\uBA70, \uD604\uC7AC \uC774 \uACF5\uACA9\uC5D0 \uCDE8\uC57D\uD55C \uCD5C\uC2E0 \uD734\uB300\uC804\uD654 \uBAA8\uB378\uC740 \uC5C6\uB294 \uAC83\uC73C\uB85C \uC54C\uB824\uC84C\uB2E4. \uBE14\uB8E8\uD22C\uC2A4 \uC5F0\uACB0\uC774 \uCF1C\uC838 \uC788\uACE0 \"\uAC80\uC0C9 \uAC00\uB2A5\"\uC73C\uB85C \uC124\uC815\uB41C \uC7A5\uCE58(\uBC94\uC704\uC5D0 \uC788\uB294 \uB2E4\uB978 \uBE14\uB8E8\uD22C\uC2A4 \uC7A5\uCE58\uC5D0\uC11C \uCC3E\uC744 \uC218 \uC788\uC74C)\uB294 \uACF5\uAE09\uC5C5\uCCB4\uC758 \uC18C\uD504\uD2B8\uC6E8\uC5B4\uC5D0 \uCDE8\uC57D\uC131\uC774 \uC788\uB294 \uACBD\uC6B0 \uBE14\uB8E8\uC7AC\uD0B9\uACFC \uC5D0 \uCDE8\uC57D\uD560 \uC218 \uC788\uB2E4. \uC774 \uAE30\uB2A5\uC744 \uB044\uBA74, \uC7A0\uC7AC\uC801 \uD53C\uD574\uC790\uB294 \uBE14\uB8E8\uC2A4\uB098\uD551\uC73C\uB85C\uBD80\uD130 \uB354 \uC548\uC804\uD560 \uC218 \uC788\uB2E4. \uB2E8, \"\uC228\uACA8\uC9C4\"\uC73C\uB85C \uC124\uC815\uB41C \uAE30\uAE30\uB294 \uBB34\uCC28\uBCC4 \uB300\uC785 \uACF5\uACA9\uC744 \uD1B5\uD574 \uC7A5\uCE58\uC758 MAC \uC8FC\uC18C\uB97C \uCD94\uCE21\uD558\uC5EC \uBE14\uB8E8\uC2A4\uB098\uD551\uD560 \uC218 \uC788\uB2E4. \uB2E4\uB978 \uBAA8\uB4E0 \uBB34\uCC28\uBCC4 \uB300\uC785 \uACF5\uACA9\uACFC \uB9C8\uCC2C\uAC00\uC9C0\uB85C, \uC774 \uACF5\uACA9 \uBC29\uC2DD\uC758 \uC8FC\uC694\uD55C \uC5B4\uB824\uC6C0\uC740 \uAC00\uB2A5\uD55C MAC \uC8FC\uC18C\uB4E4\uC758 \uAC1C\uC218\uC774\uB2E4. \uBE14\uB8E8\uD22C\uC2A4\uB294 48\uBE44\uD2B8 \uACE0\uC720 MAC \uC8FC\uC18C\uB97C \uC0AC\uC6A9\uD558\uBA70, \uC774 \uC911 \uCC98\uC74C 24\uBE44\uD2B8\uB294 \uC81C\uC870\uC5C5\uCCB4\uAC00 \uACF5\uD1B5\uC73C\uB85C \uC0AC\uC6A9\uD55C\uB2E4. \uB098\uBA38\uC9C0 24\uBE44\uD2B8\uB294 \uC57D 1680\uB9CC \uAC1C\uC758 \uAC00\uB2A5\uD55C \uC870\uD569\uC744 \uAC00\uC9C0\uACE0 \uC788\uC73C\uBA70, \uBB34\uCC28\uBCC4 \uB300\uC785 \uACF5\uACA9\uC73C\uB85C \uCD94\uCE21\uD558\uAE30 \uC704\uD574\uC11C\uB294 \uD3C9\uADE0 840\uB9CC \uBC88\uC758 \uC2DC\uB3C4\uAC00 \uD544\uC694\uD558\uB2E4. \uBB34\uC120 \uB124\uD2B8\uC6CC\uD06C\uC758 \uC778\uAE30\uC640 \uD568\uAED8 \uBB34\uC120 \uC2DC\uC2A4\uD15C\uC5D0 \uB300\uD55C \uACF5\uACA9\uB3C4 \uC99D\uAC00\uD588\uB2E4. \uACF5\uACA9\uC790\uB294 \uC870\uC9C1 \uB124\uD2B8\uC6CC\uD06C\uC758 \uC561\uC138\uC2A4 \uD3EC\uC778\uD2B8 \uCDE8\uC57D\uC810 \uB610\uB294 \uBB34\uB2E8 \uBB34\uC120 \uC7A5\uCE58\uB97C \uAC80\uC0C9\uD558\uC5EC \uB124\uD2B8\uC6CC\uD06C \uBCF4\uC548\uC744 \uC6B0\uD68C\uD560 \uC218 \uC788\uB3C4\uB85D \uD558\uB294 \uACBD\uC6B0\uAC00 \uB9CE\uB2E4. \uC790\uB3D9\uCC28\uB098 \uB2E4\uB978 \uAD50\uD1B5\uC218\uB2E8\uC744 \uC774\uC6A9\uD574 \uB113\uC740 \uC9C0\uC5ED\uC5D0 \uBB34\uC120\uC2E0\uD638\uB97C \uAC80\uC0C9\uD558\uACE0 \uC788\uB294 \uC804\uC7C1\uC6B4\uC804\uC744 \uD1B5\uD574 \uB85C\uADF8 \uC811\uC18D\uC810\uACFC \uC548\uC804\uD558\uC9C0 \uC54A\uC740 \uBB34\uC120 \uB124\uD2B8\uC6CC\uD06C\uAC00 \uBC1C\uACAC\uB418\uB294 \uACBD\uC6B0\uAC00 \uB9CE\uB2E4. \uBE14\uB8E8\uC2A4\uB098\uD551\uC740 \uBE14\uB8E8\uD22C\uC2A4 \uD504\uB85C\uD1A0\uCF5C\uC744 \uC0AC\uC6A9\uD558\uC5EC \uC804\uC1A1\uD558\uB294 \uBB34\uC120 \uC7A5\uCE58\uC758 \uC815\uBCF4\uC5D0 \uC811\uADFC\uD558\uAE30 \uC704\uD55C \uACF5\uACA9\uC774\uB2E4. \uBAA8\uBC14\uC77C \uAE30\uAE30\uC758 \uACBD\uC6B0, \uC774\uB7EC\uD55C \uC720\uD615\uC758 \uACF5\uACA9\uC740 (IMEI)\uB97C \uBAA9\uD45C\uB85C \uD558\uB294 \uB370 \uC790\uC8FC \uC774\uC6A9\uB41C\uB2E4. \uC774 \uB370\uC774\uD130\uC5D0 \uC811\uADFC\uD558\uBA74 \uACF5\uACA9\uC790\uB294 \uC0AC\uC6A9\uC790\uAC00 \uBAA8\uB974\uB294 \uC0AC\uC774\uC5D0 \uAC78\uB824\uC624\uB294 \uC804\uD654\uC640 \uBA54\uC2DC\uC9C0\uB97C \uB2E4\uB978 \uC7A5\uCE58\uB85C \uC6B0\uD68C\uC2DC\uD0AC \uC218 \uC788\uB2E4. \uBE14\uB8E8\uD22C\uC2A4 \uACF5\uAE09\uC5C5\uCCB4\uB294 \uCDE8\uC57D\uD55C \uBE14\uB8E8\uD22C\uC2A4 \uC7A5\uCE58\uB97C \uBCF4\uC720\uD55C \uACE0\uAC1D\uC5D0\uAC8C \uC548\uC804\uD558\uC9C0 \uC54A\uC740 \uAC83\uC73C\uB85C \uAC04\uC8FC\uB418\uB294 \uC9C0\uC5ED\uC5D0\uC11C \uBE14\uB8E8\uD22C\uC2A4 \uC7A5\uCE58\uB97C \uB044\uAC70\uB098 \uAC80\uC0C9 \uBD88\uAC00\uB85C \uC124\uC815\uD560 \uAC83\uC744 \uAD8C\uACE0\uD55C\uB2E4. \uC774 \uBE14\uB8E8\uD22C\uC2A4 \uC124\uC815\uC744 \uD1B5\uD574 \uC0AC\uC6A9\uC790\uB294 \uD638\uD658\uB418\uB294 \uBE14\uB8E8\uD22C\uC2A4 \uC81C\uD488\uC744 \uC0AC\uC6A9\uD560 \uC218 \uC788\uC73C\uBA74\uC11C \uB2E4\uB978 \uBE14\uB8E8\uD22C\uC2A4 \uC7A5\uCE58\uAC00 \uC774\uB97C \uAC80\uC0C9\uD560 \uC218 \uC5C6\uB3C4\uB85D \uD560 \uC218 \uC788\uB2E4. \uBE14\uB8E8\uC2A4\uB098\uD551\uC740 \uC0AC\uC0DD\uD65C \uCE68\uD574\uC774\uAE30 \uB54C\uBB38\uC5D0 \uB300\uBD80\uBD84\uC758 \uB098\uB77C\uC5D0\uC11C \uBD88\uBC95\uC774\uB2E4."@ko . "Le bluesnarfing est le nom donn\u00E9 \u00E0 une technique de piratage des informations contenues dans un appareil utilisant une connexion Bluetooth (tels qu'un t\u00E9l\u00E9phone portable, un ordinateur portable ou un PDA). Cette technique ne laisse pas de traces. Elle permet \u00E9galement d'ajouter des informations (contacts dans le r\u00E9pertoire par exemple). L'attaque peut se faire \u00E0 partir d'un ordinateur mais \u00E9galement \u00E0 l'aide d'un GSM bluetooth compatible et un logiciel en java."@fr . . . . "\uBE14\uB8E8\uC2A4\uB098\uD551"@ko . "Bluesnarfing \u00E8 il nome che identifica la tecnica e il tool di sicurezza utilizzato per accedere senza autorizzazione ad informazioni private contenute all'interno di un cellulare o di un PDA o di un qualsivoglia apparecchio che permetta l'utilizzo di una connessione bluetooth. Grazie a questo tipo di intrusione \u00E8 possibile accedere a buona parte dei contenuti dell'apparecchio sotto attacco, come per esempio il calendario, i contatti della rubrica, le email ed i messaggi di testo. Su buona parte degli apparecchi vulnerabili l'accesso avviene non solo in lettura, ma anche in scrittura, ne consegue che risulta quindi possibile modificare, aggiungere e cancellare i contenuti dell'apparecchio attaccato. Attualmente esistono pi\u00F9 programmi disponibili per effettuare questo tipo di attacco, uno dei primi tool sviluppati per la piattaforma Gnu/Linux \u00E8 stato bluesnarfer Archiviato il 27 dicembre 2017 in Internet Archive. sviluppato da due esperti di sicurezza informatica italiani, Roberto Martelloni e Davide Del Vecchio, all'incirca nel 2004, per essere di supporto a un articolo in italiano che spiega i fondamenti teorici che stanno dietro a questo attacco, l'articolo \u00E8 al momento reperibile sia sulle home page Archiviato il 27 dicembre 2017 in Internet Archive. dei due autori del tool che sul sito dell'ezine per la quale \u00E8 stato pubblicato l'articolo, questo tool inoltre si trova attualmente installato sulla maggior parte delle distribuzioni linux orientate alla sicurezza informatica. Sebbene sia il Bluesnarfing che il Bluejacking sfruttino una connessione Bluetooth senza che gli utilizzatori leciti ne siano a conoscenza, l'attacco bluetooth \u00E8 pi\u00F9 pericoloso, infatti, qualsiasi dispositivo con la connessione Bluetooth attivata e \"visibile\" (in grado cio\u00E8 di essere rilevata da altri dispositivi Bluetooth nei dintorni) pu\u00F2 essere suscettibile di Bluesnarfing, qualora il dispositivo attaccato risulti vulnerabile o qualora il livello di sicurezza impostato sul dispositivo non sia stato impostato adeguatamente. Solo disattivando il Bluetooth completamente, la potenziale vittima, troncando ogni possibilit\u00E0 di comunicazione attraverso il protocollo bluetooth, pu\u00F2 sentirsi pi\u00F9 al sicuro dalla possibilit\u00E0 di essere attaccata, infatti anche un dispositivo impostato per non segnalare la sua presenza agli altri dispositivi pu\u00F2 facilmente essere rintracciato effettuando una ricerca dell'indirizzo che lo identifica (MAC address del dispositivo) tramite un attacco a forza bruta. Come in tutti questi tipi di attacchi, il principale ostacolo \u00E8 l'ampio spazio di ricerca degli indirizzi nel quale ricercare, nello specifico il protocollo Bluetooth usa un unico MAC Address a 48-bit, di cui i primi 24 bits identificano il produttore; mentre i rimanenti 24 bits permettono di discriminare circa 16.8 milioni di combinazioni e di conseguenza di dispositivi. Poich\u00E9 il Bluesnarfing rappresenta una violazione della privacy, questo tipo di attacco risulta illegale in molte nazioni."@it . . . . "Bluesnarfing"@pl . .