iPhone’s Bluetooth Bug and the Metasploit Framework

As balle already pointed out, there is a major Bluetooth Bug in iPhones. The SDP-Service can be exploited to execute arbitrary code. The funny thing with iPhones is, that even when Inquiry Scan is disabled (“hidden Bluetooth device”) it’s easy to find out the Bluetooth Address of an iPhone: The WiFi-address is the Bluetooth address incremented by one. When you know the MAC Address of the iPhone, you also know the Bluetooth address.

Another interesting thing: The Metasploit Framework about to be ported to the iPhone. All the applications seem to run as UID 0 on the iPhone – this is going to be fun!

Source: Computerworld

One thought on “iPhone’s Bluetooth Bug and the Metasploit Framework”

  1. Hi

    I want to know what kind of tools is suitable for lunching an attack to a IPhone device??

    I tried some tools like Candy software to stealing images from a bluetooth enabled device (it was like old nokia phones).

    best regards

Comments are closed.