ASSIGNMENT-I
1. What is Bluetooth Hacking? What makes it dangerous?
2. What do you mean by Bluetooth Discovery? How can you perform Bluetooth discovery?
3. What are the various steps involved in Bluetooth Hacking?
4. What is BlueSnarfing?
5. What are the dangers associated with Bluejacking?
6. What are some of the countermeasures available to prevent Bluejacking?
7. What are some of the countermeasures available to prevent BlueSnarfing?
8. How can you crash some older versions of cellphones with the help of only text messages? How do most mobile phone viruses spread?
ASSIGNMENT-II
1. What do you mean by Pairing?
2. Describe discovery, pairing and binding.
3. Describe the various steps involved in Bluejacking.
4. Describe some DoS attacks available on the mobile phone platform.
5. What are the dangers associated with mobile phone viruses and worms?
|