I want to search around me for ppl with bluetooth phones or PDA's. Is there any good program for that? It should work with pocket pc 2003.
Have a nive day.
Let's see:
1) First post
2) Looking for sniffer software to detect people using bluetooth around you.
I'm thinking you're in the wrong place unless you can come up with a good reason to want to do this.
db
blutooth sniffing / packet insertion / snarfing.
Bluesnarf will compile and run if used with the litmus toolkit..
bluesnarf
cool, but where do u get the prog from?
mate,
try this out; app is called "meeting point". i copied and pasted the details from the web; as seen below:
===================================
Description:
This application is designed to search for -and to communicate with- other instances of itself running on other devices using Bluetooth.
When two or more MeetingPoints are within Bluetooth working distance, they will automatically exchange messages.
Meeting somebody for the first time and worried if you could identify the right person?
Need to meet a client on airport, bar, or another crowded place?
Just "tune" the same channel and it will fire an audible alarm when both meeting parties are close enough.
Do you want to exchange messages with anybody on working range? Just select the PUBLIC broadcast channel.
MeetingPoint works on many Operating Systems / platforms, such as PalmOS, Windows Mobile 2003, Windows 9x/NT/2000/XP and smartphones Symbian Series 60.
Every time a Bluetooth device is found, MeetingPoint communicates with it and attempts to perform a handshake. If the contacted device is also running MeetingPoint, and is "tuned" in the same channel, they will exchange messages and its users will hear an alarm notifying of the arrival of a new message.
MeetingPoint uses Bricenter's FDE (Fast Discovery Engine). FDE algorithm is based on statistical probabilities, and works well in the real world.
In a real situation, devices launch MeetingPoint at a random time and far away from the actual meeting place. When they enter the "meeting zone", their Bluetooth states are "shuffled" enough and, according to statistical probabilities, the "contact time" should be minimal. This is a critical feature designed specially for cases were people are moving.
MeetingPoint will redefine "bluetoothing" to a new level.
===================
cheers
robson
bluesnarf
ok thats cool, but what about the forced entry abilities that 'snarf claims to have? i think the only way to protect myself from it is to understand how it works.
Smiley
Re: bluesnarf
smiley_thing69 said:
i think the only way to protect myself from it is to understand how it works.
Click to expand...
Click to collapse
How about turning off Bluetooth?! :lol:
No, seriously..
I don't consider bluesnarfing and bluejacking such a big deal, but it would be fun to try it..
Lemme know it you find "bluesnarf1.0_ARM.cab" or something..
Hi Guys
Is there a good firewall that we can use with the universal? Do we really need one?
when i browse the web on my Exec i use it over wifi so is that safe, (my home is protected BUT what about the free HOTSPOTS in the city centre <I trust star bucks with my coffee-do I trust them with my internet security?
Would any of you guys use your PDA's webpage to buy something from a website (ebay) or even online banking?
Im not to fused about someone hacking my PDA through my wifi/internet connection, come on the way I look at it, if some one is that good Im sure they have better things to hack then mine! lol
Im more concerned about if I am going to log onto ebay's webpage how secure is my information while its being sent from My PDA browser to there server?
IL appreciate everyone’s thoughts on this!
YES VIJAY that includes you as well,
GUYS KEEP YOUR REPLIES IN RELATION TO THIS THREAD, if you want to talk about your aunty janes cats dogs friends sisters leg, start another thread!)
You don't need one.
Ward said:
You don't need one.
Click to expand...
Click to collapse
could you explain why, please?
@ WARD
why dont we need one? because you say so? lol
come on mate you can not give a one sentence reply and walk away from this, do you know how long it has taken me to write the post?
unless you a allsinging alldancing knowit all---------, well even if you are, give a better reply then "you dont need one"
or dont post at all.
you dont need one
You don't need a firewall now, because:
a) No tools for the PPC are really available at the moment, and
b) What exactly are they going to do when they hack in?
c) More importantly, you won't FIND any firewalls for Windows Mobile.
But as to the question of how safe is the information being sent to eBay; well, Pocket IE (Internet Explorer Mobile) is based off IE 5 and 6, with the same security levels. So if you access something with that little lock icon on, you're pretty secure.
If not, you're taking the same risk as normal browsing.
OK guys come on give better answers then "you dont need one"
we are not all mind readers,
:?:
breakit down, whywe dont need one?
how safe is your data when its sent from your device?
try to read my intial thread and reply to the points in there,
I am sure that you are not naive to think we dont need one because our networks tell its its safe or because microsoft does,
How many times has microsoft security been compermised?
Networks- remmber t-mobile? when there servers where being hacked (one good thing that came out of that was pairs hiltons EMAILS! along with the secrect service but with parisss its was more of like many online service providers, T-Mobile.com requires users to answer a "secret question" if they forget their passwords. For Hilton's account, the secret question was "What is your favorite pet's name?" By correctly providing the answer, any internet user could change Hilton's password and freely access her account. and her pet dog name is!!! Chihuahua
http://www.theregister.co.uk/2005/01/12/hacker_penetrates_t-mobile/ )
@ snorbaard
thanks dude
N2h, you're being rather rude, so I would have expected a lot more "you don't need one" replies by now just to spite you. I'll answer your question first, and then detail why I believe you're being rather rude.
--
What you're asking about isn't really a firewall. A firewall is used to prevent certain communications either coming into a machine, or going out of it. E.g. a firewall could be placed on outbound port 80 to prevent users from browsing 99% of the web, or a firewall can and should be placed on inbound port 139 to stop some older netbios 'attacks'.
What you're really asking about is whether the communication you do via your PocketPC - over wifi - is 'secure' in that others can't access your information. The answer to that isn't a simple yes/no - it will depend on a few things.
The first thing to make sure as that the access point you're using has WEP (Wireless Encryption Protocol) enabled. The bigger the key, the better. This will mean that 'over the air', your information will be encrypted. Anybody who would 'snoop' that information from the air will need a LOT of data, and a reasonably fast machine, to get the WEP key.
The next thing to make sure is that if the information you're sending is rather sensitive, that you send this information to a site which is using SSL. SSL encrypts your data on your PocketPC itself, all the way through the WiFi router/access point, over the internet, bouncing off of satellites - whatever, until it reaches the destination website where the data is decrypted again. The odds of anybody cracking that signal are *very* slim. It can be done, but it takes ages and ages on multiple computers for even the simplest of SSL encryptions. The 'dumb' way to check whether the site uses SSL is to see if the URL starts with "https". The 'proper' way is to check if the padlock icon is 'locked' in PIE (left of the address bar).
The third thing, if you're using e-mail, is to use an e-mail encryption application, such as PGP. I'm not aware if any exist for PocketPC, but I'm sure they do. These basically encrypt your message in a way that it can still be sent by plain e-mail. The recipient then decrypts the message again on their end. Based on the encryption method used and the length of the message, it would take quantum computers to decrypt it to anything meaningful.
--
For those wondering whether you do indeed need a Firewall - no, you don't. You may wish to look into some basic BlueTooth protection if you leave that on a lot, but other than that there are no real intrusion points for a PocketPC that you'd have to be worried about.
Microsoft may turn the PocketPC into some ueberplatform in the future which would make it more vulnerable, or maybe they learned their lesson and they'll keep things fairly secure - who knows.
--
Now then.. as to why you're being rude...
First.. your post - what's with the bold blue text? Do you think it would get people's attention easier? Just makes it more difficult to read.
Second... you address a specific person, vijay555 - who is a very busy person. But even if he wasn't, it's a bit presumptious of you that 1. he would be reading this, 2. he would be interested in replying at all.
Third... you presume that people would go off-topic, in your original post (in large red type, at that). Why not have a bit more faith in fellow man and see what replies roll in, first? Then if people go off-topic, point it out and ask that they try and address the issue you raised in your post.
Fourth... when somebody does answer your post, even if it is a rather short reply, you tell them to either post a better reply, or not reply at all. Don't be surprised if many people will interpret this in a way that will make them not want to reply to any of your posts at all.
--
Edit: and such is the cost of typing long replies - other people reply before you
zeboxxxxxxxxxxxxxx lol
thatsmade me laugh :lol:
thanks mate
FROM ZEBOX (sorryabout the caps hope i dont hurt anyones feeling)
Now then.. as to why you're being rude...
First.. your post - what's with the bold blue text? Do you think it would get people's attention easier? Just makes it more difficult to read.
dude I LIKE USING COLOURS lol
Second... you address a specific person, vijay555 - who is a very busy person. But even if he wasn't, it's a bit presumptious of you that 1. he
would be reading this, 2. he would be interested in replying at all.
tust me he gets around!
Third... you presume that people would go off-topic, in your original post (in large red type, at that). Why not have a bit more faith in fellow man and see what replies roll in, first? Then if people go off-topic, point it out and ask that they try and address the issue you raised in your post.
Fourth... when somebody does answer your post, even if it is a rather short reply, you tell them to either post a better reply, or not reply at all. Don't be surprised if many people will interpret this in a way that will make them not want to reply to any of your posts at all.
all in one, the amount of threads iv read where the converstion has gone off topic----------- so had to make that clear,
andbeing honest Im having a lugh so i dont want anyone to take it personaly if Imake a checky comment,
and zeboxx this ones just for you
You still don't need a firewall for your Pocket PC.
A firewall in the sense I understand it is a filtering application which brackets network access: rejecting unsolicited packet, applying appication based rules and optionally, performing some filtering on incoming content.
You don't need one, because: there is very little need to restrict application access to the network - malicious apps exist, but its so difficult for them to gain a foothold on your PPC without you knowing about it. So on a clean PPC, a firewall does nothing useful. Dropping unsolitcited packets is nice, but your PPC is mobile - not always connected and therefore of extremely low risk of network intrusion - AFAIK, I've never even heard of a case.
Save your money and CPU and carry on. P.S. PPC AntiViruses are similarly useless, don't listen to PR hype.
@@ ward
Ward thanks for that between you and snorbaard my questionshave been answerd
regarding firewalls and website security!
thanks dude
ward, zeobox Suggested that i was rude to you andmay have hurt your feeling , well my apologies hope we can b friends :lol: lol
cheers bud
RE
Quote
"c) More importantly, you won't FIND any firewalls for Windows Mobile."
AIRSCANNER has one, however, its not currently for WM5 yet
Here:-
http://airscanner.com/downloads/firewall/firewall.html
Keep a close watch on AIRSCANNER for the WM5 version though
RE
ZeBoxx
How to protect your PPC when you're surfing at free hotspots?
I believe that the response should be "You don't need a firewall for your WM5 device - yet."
It's very possible that there are vulnerabilities present in WM5 O/S that simply have not been found yet. There may even be vulnerabilities in WM5 that allow people to reset your device remotely, edit and remove information, etc.
Why would there be vulnerabilities in WM5?
Firstly, its made by Microsoft, and Microsoft has a very bad track record when it comes to this type of thing. Secondly, even if all preventions towards vulnerabilities were taken by Microsoft, it's always possible for one smart hacker to link together something that nobody has ever thought about before. Basically, vulnerabilities are always possible.
If there are vulnerabilities in WM5, why havent I heard about it yet?
Currently the number of devices running WM5 are very small. Theyr also very new, and thus hackers havent really begun to try. It only takes one good enough hacker to do it, though.
Therefore I don't think ruling out firewalls as being irrelevant to WM5 devices is the right way to go about it. Currently, theyr not needed, but who knows? In a months time we might all be scrambling for a firewall as some worm runs riot deleting our files..
It would probably be nice to have a firewall available, anyway. 8)
Just thought I would post to point out that when you go online using GPRS most service providers give you a NAT connection which is in practice the same as a firewall. No incoming connections are allowed, you don't have a public IP address.
This is largly because if you had a public IP all the viruses on the net looking for unsecure Windows machines would flood out your GPRS connection and use up all your credit without you doing anything.
chinnybob said:
Just thought I would post to point out that when you go online using GPRS most service providers give you a NAT connection
Click to expand...
Click to collapse
Very true - also, nearly all wireless hotspots will do the same thing, generally decreasing the amount of potential hackers to only other users sharing the same hotspot.
If your device ever gets hacked while using a hotspot, look around for the guy with the laptop trying to look the other way. :twisted:
As I understand it, there's built in facilities for port redirection and monitoring in Windows Mobile already. Whether or not you'd wish to use it for anything is down to a coder.
As everyone is saying, there are two distinct issues I see here:
1. Are your communications secure between PDA and Server?
2. Is your PDA secure to external intrusions?
Question 1 is addressed above. Use appropriate good sense, keep an eye out for SSL and https and always be weary of transmitting anything sensitive over an open channel. Would I use my PDA to buy something over the net? Probably not - I barely trust my PC browser (and I wrote and secured it myself), and although there's little reason to trust PIE less, that's not a high state of confidence. I always half expect to get cheated/identity theft-ed over the net. But use good common sense, reliable traders and be weary of all open connections that you don't control.
Question 2.
Intrusions. Again, as everyone is saying - as of now, there's not an enormous amount of damage that could be done to your PDA even if someone could stomp all over it without your knowledge. Worst case, you need to hard reset, and someone steals all your personal info.
However, there aren't many well known exploits that you need to worry about. But, that probably means that there are exploits known to those who would be interested in you.
However, since you're wifi roaming, it's likely your IP is dynamic. Somebody would have to have an idea of where you are and be particularly interested in finding you on the net to track you down. (although that's easy enough to do if they know your habits. Server logs give a wealth of info for free! I can see many visitors to my website directly from warez sites. If I wanted to backtrace to an ISP, a server or a user, the info is there in front of me)
So, someone can find you on the net. They then need to identify you as using a PDA they can exploit. They have to know exploits. They can then get access to your system. What's the worst that can happen? As everyone says, be weary of carrying very sensitive info on you phone, at least unencrypted. They're small things prone to theft and loss. If you would worry if it was stolen from your hand, don't put it on there, or encrypt it. Doubley so if you're using public wifi.
There are exploits to take advantage of your system. I'm working on stuff that could easily be classified as a trojan, and there is live code, years old, demonstrating the techniques.
Best advice: be careful. Your PDA is naked compared to your PC (which is firewalled, anti virused, and anti-spyed already. right?) Just because no one is interested in looking at your PDA's undies, doesn't mean you should flash them around. Use good sense on all public networks. However, given the hardware limitations of our PDAs, I'm inclined to say, better to leave it unprotected but not at risk (ie not carry highly sensitive info), then have CPU intensive protection that's counterproductive and unlikely to be needed most of the time.
Others would have different priorities. You have to judge what you have at stake.
V
VIJAY thanks for the reply your thoughts are allways much appericated.
when you say you have secured your own browser is it a programme that's available on your site or a 1of thing that you did? someone else advised me that netfront 3.3 (or what ever the latest version is) is more secure then ie any thoughts on that.
thanks
N2h
p.s zeooooooobox guess ur sorry ass was wrong after all.
N2h said:
VIJAY thanks for the reply your thoughts are allways much appericated.
when you say you have secured your own browser is it a programme that's available on your site or a 1of thing that you did? someone else advised me that netfront 3.3 (or what ever the latest version is) is more secure then ie any thoughts on that.
thanks
N2h
Click to expand...
Click to collapse
He said quite specifically his PC browser. (i.e. not a browser on his phone)
As someone said earlier, just make sure the little padlock is there. SSL encryption is good enough for most things.
Who can tell me what the "hackable footprint" of a "networked" WM5 device is ?
What I mean is, what ports or services are running on a networked device that I can send commands to ?
Back in the old days with windows, a fresh installed computer had about 12 ports open which enabled a variety of hack attacks.
Using S.O.T.I pocket controller (enterprise) I can see many services running. However, a portscan shows no listeners (quite normal, as there prolly ain't no IIS , SMTP or NETBIOS service running.
The question remains, what's the hackable footprint ? Where should I start to look to hack my way into a networked device ? Has it ever been attempted ?
I did find some usefull stuff here : http://www.phrack.org/phrack/63/p63-0x06_Hacking_WindowsCE.txt
I'm talking about my own device here, not someone elses. Hope I won't be banned for asking this kind of stuff.... I'm just curious.
There's another Phrack article/presentation that goes into more detail on general hacking of WM devices, linking to the post you posted. They don't discuss much network hacking, but day-to-day, there are other ways into the Windows Mobile devices...
V
Hi Everyone,
I'm fairly new to developing on pocket PC's but I've been developing applications for many years. I was wondering if anyone knew of a way to redirect another programs attempt to access certain files remotely?
What I'm looking at doing is creating a program that would allow me to specify what IP/domain I want to redirect, and where I want those requests to actually go. Doing what the hosts file does in a PC.
I've had a search online and on this forum and couldn't find anything related to what I'm after. If anyone has any ideas on how to do this, or any resources that might be useful/a good read then please post
Supposedly WM has a built in firewall. It might just be CE, but the SDK seems to suggest WM generally. Have a look on MSDN for port redirection and interception. I've written some posts on it way back on here... but on unrelated topics.
Apologies for brevity, have to run
V
vijay555 said:
Supposedly WM has a built in firewall. It might just be CE, but the SDK seems to suggest WM generally. Have a look on MSDN for port redirection and interception. I've written some posts on it way back on here... but on unrelated topics.
Apologies for brevity, have to run
V
Click to expand...
Click to collapse
Thanks for the tips I'll have a read in a bit and see what I can come up with.
From the sounds of it, you want to make a DNS proxy. To do this, you need to intercept all dns requests and process them accordingly.
--Edit--
Now that I think about it, if you hook the look up function, gethostbyname()
I've got an application that will only work if it sees a particular device that has been set on an enterprise server and I'm desperate to use my Hermes device rather than the supplied Windows Smartphone that doesn't have a stylus - yuk!
The log reports this:
DevOS=PocketPC
Device=HERM200
PPC device is unknown: [HERM200]
If I can change this to something else that is known by the enterprise server then I can continue loading the software.
I've searched the registry and can't find the string "HERM200" and I've tried changing the entry in ActiveSync on my PC but that just gets refreshed.
Any ideas or I will have to use my stylus free smartphone instead :-( No more billiard master either :-(
It'd be easier to crack the app rather then change your OEMInfo.
If it's not confidential, email it to me for a quick look, or post it here for the Legion to mull over.
V
It's Credant Mobile Guardian and the rules base is controlled by the enterprise server. The only program that runs is GKProbe.exe on the PC. I think it would be a mare to crack.
Thanks
It's likely to be easier to crack the app rather then OEMInfo - IIRC OEMInfo is embedded in the Rom/hardware. You could hack the ROM I guess, but I'd start off with the app personally.
V
Viijay,
Thanks for your replies. I've got the installation application. Would this be something that you could crack?
Thanks