Richard is an IT security expert currently making presentations in Las Vegasat a logical security conference. Richard’s specialty is in Bluetooth technology and different ways to take advantage of its vulnerabilities. Richard is using one of his Bluetooth enabled cell phones and a Bluetooth enabled laptop to make a demonstration on how to steal information from a wireless device through a Bluetooth connection. Richard shows how to connect to the OBEX Push target and how to perform an OBEX GET request to pull the address book and calendar off thecell phone. What type of attack is Richard demonstrating here at the conference?
A.
Richard is demonstrating Bluesnarfing by stealing information from a wireless device through a Bluetooth connection.
B.
He is showing how to perform a Bluejacking attack by exploiting the inherent weaknesses in Bluetooth connections.
C.
This attack that Richard is demonstrating is called a BlueSpam attack.
D.
At the conference, Richard is demonstrating how to perform a BlueBack attack
Correct answer is A