Using a vulnerability within the Bluetooth software, an attacker can establish a Bluetooth connection with a victim’s phone and gain unauthorized access to the phone’s contents. The attacker is then able to copy the contents. What term best describes this type of attack?
Correct Incorrect Unanswered Report Issue Answer Description
Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection. This differs from bluejacking where the attacker is only able to send data (such as ads) to the compromised device.
Wikipedia
Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant). This allows access to calendars, contact lists, emails and text messages, and on some phones, users can copy pictures and private videos. Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge. While Bluejacking is essentially harmless as it only transmits data to the target device, Bluesnarfing is the theft of information from the target device.
Bluesnarfing - Wikipedia, the free encyclopedia Subscribe to avoid duplicate questions and track your progress over time