BSAM methodology resources
In this section, resources and tools are listed that enable the execution or evaluation of the Bluetooth security controls from previous sections.
Table of contents
- BSAM-RES-01 - Physical identification of the controller
- BSAM-RES-02 - Identify controller through reports
- BSAM-RES-03 - Vulnerability database search
- BSAM-RES-04 - Bluetooth connections sniffing
- BSAM-RES-05 - Capture of a Bluetooth connection
- BSAM-RES-06 - Enabling debug mode on a Bluetooth controller
- BSAM-RES-07 - Sending and receiving HCI messages
- BSAM-RES-08 - Device discovery
- BSAM-RES-09 - Changing the attributes of a controller
- BSAM-RES-10 - Link key management on the host