Nowadays users demand sophisticated applications and services on their mobile phones since they have become a basic necessity for everyday life. The Symbian operating system has the features outlined earlier and provides a security and data protection module, besides it is one of the world market leader in mobile phones. The attacks described here were made through ‘Bluetooth technology’, and its importance lies in the ease of operation for any user, but this also represents risks and vulnerabilities that threaten the security mechanisms offered by different mobile phones. This research used direct attacks on Bluetooth communication to violate such mechanisms. The techniques used are well-known hacking practices like Bluejacking, Bluebug, Bluesnarfing and Blueprinting for Nokia GSM smartphones. The results show evidence that can be obtained from mobile phones which allows the forensic investigator to have solid basis todetermine that an attack was successfully done and what kind of information wasremoved or copied from the mobile phone. The main purpose of this research is to provide forensic investigators with evidence to detect mobile phones violated by direct attacks using a methodology for forensic analysis based on NIST SP 800-86.
Key words: Mobile, bluejacking, bluebug, blueprinting, bluesnarfing, borensics bairing, Symbian OS, bluetooth.
Copyright © 2022 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0