🔥 40% Off Crucial Exams Memberships — Deal ends today!

8 minutes, 58 seconds remaining!

Certified Ethical Hacker (CEH) Practice Question

During a red-team assessment you passively capture Bluetooth Low Energy (BLE) traffic with an Ubertooth One while a wireless keyboard pairs with its USB dongle. Packet analysis shows that the devices used Legacy "Just Works" pairing with no passkey or OOB data. What is the most effective next step to recover the encryption material so you can decrypt the keystrokes contained in the capture?

  • Run sdptool browse against the keyboard to list its Service Discovery Protocol records and locate a PIN code

  • Perform a BlueBugging attack with bluebugger to request the device's link key over an RFCOMM channel

  • Use hciconfig hci0 inq to force a new pairing and capture a numeric-comparison code on the screen

  • Process the packet capture with crackle to compute the STK and extract the Long-Term Key used by the keyboard

Certified Ethical Hacker (CEH)
Wireless Network Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot