Handy Bluetooth Hack

Handy Bluetooth Hack Das könnt ihr tun, um euch vor einem Bluetooth Hack zu schützen

Bluetooth-Hack ermöglicht Malware-Angriffe – So schützt Du Dein Handy. bluetooth-hack. Auch wenn Du Kopfhörer, Lautsprecher und mehr. Mit Bluetooth kann man Geräte ohne Kabelsalat miteinander verbinden. So bringt ihr etwa Musik vom Smartphone in den Kopfhörer, ohne dass. Bluetooth-Handy vor Hacker-Angriffen sichern. Keine Chance für Kriminelle. Smartphone vor Bluetooth-Angriffen schützen. | t-online. Mit Super Bluetooth Hack kannst du Dateien auf einem über Bluetooth verbundenen Android-Smartphone sehen und bearbeiten. Um Super Bluetooth Hack zu. Milliarden betroffen: Hacker kommen über Bluetooth auf Ihr Handy Sicherheitslücke Bluetooth: Wer auf seinem Smartphone die Funktechnik.

Handy Bluetooth Hack

Auf älteren Smartphones kann es nämlich zu einem Bluetooth Hack erwähnten Handys verfügt, nutzt ihr Bluetooth und seid potentiell von. Bluetooth-P2P-Verbindungen lassen sich mit einem kleinen Hack Smartphone-Nutzer haben irgendwann schon einmal Bluetooth benutzt. Mit Bluetooth kann man Geräte ohne Kabelsalat miteinander verbinden. So bringt ihr etwa Musik vom Smartphone in den Kopfhörer, ohne dass.

Handy Bluetooth Hack - „Blueborn“ ermöglichte Übernehmen von Bluetooth-Geräten

Zum Vergleich: In der fünften Generation sind es Meter. Ich habe vor einer Weile wochenlang nach einer Lösung für die nerv-freie Verbindung gesucht und bin nicht fündig geworden. Kostenlos herunterladen.

Nothing is hidden from you. Today i am sharing very interesting trick that how to hack Bluetooth Hacker well you all are familiar with a term of hacking and now a days the people who are unaware of hacking losses their important data, credit card numbers and lots of other things which are valueable.

Well today I am sharing an interesting piece of hacking. People are amazed when they see hacker access a mobile phone with the android bluetooth hacker and multimedia phones.

But let me tell you its very simple. There are various bluetooth hacker apps and lot of software already available on the different website which helps hackers to hack any cell phone and multimedia phones.

Press the SCAN button 2. Treo users with a Mac should opt to use the Bluetooth technique described earlier.

PdaNet suggests it can run under Virtual PC, though that only gives your emulated PC access to the Internet—and this usage is not supported.

Be very careful with this application: many users are unable to maintain an Internet connection to their Mac for more than five minutes, and there is no return policy.

The Windows component is installed to your desktop, and then you are prompted to HotSync the Palm component onto your Treo see Figure Once the installation is complete, you will notice a new PdaNet icon in your System Tray the icons by your clock , which indicates your connection status, as shown in Figure The PdaNet icon indicates whether you have an active Internet connection through your Treo; right-click on it to get to the advanced PdaNet settings.

Figure shows PdaNet running on a Treo. Your Treo automatically attempts to establish a connection to its wireless Internet service; if successful, PdaNet will then tether that connection over your USB HotSync cable to your laptop.

You should be able to use any Internet applications on your laptop, as long as your Treo is able to keep connected to its wireless Internet service.

Check into this before you consume too many KB on your Treo. It has proven to be surprisingly popular in many parts of the world particularly Japan, the Philippines, and much of Europe , but for one reason or another has been less than enthusiastically received in the United States.

Part of the barrier to entry for many people is the sometimes painful text entry interface on most mobile phones. The demand for tiny phones has squeezed out virtually all hope of a usable integrated keyboard.

While predictive text technologies such as T9 have helped make typing require fewer keystrokes, the interface is still far from intuitive.

Many people find themselves obsessively hitting number keys in a feeble effort to express themselves, most times mistyping one or two letters along the way.

If you have a Bluetooth-enabled phone, there is a better way. To get started, be sure that Bluetooth is enabled and that your phone is paired with your laptop.

When you launch Address Book with Bluetooth enabled, you will notice an extra Bluetooth button at the top-left corner of the window, as shown in Figure Click this button to enable Bluetooth integration in Address Book.

Having Bluetooth enabled turns on a number of useful features. In addition to being able to simply dial the number directly from an Address Book entry, you can also send an SMS message.

This opens a small textbox for you to type in your message. Lo and behold, you can use your standard keyboard to enter SMS messages!

Address Book also gives you possibly the most useful Caller ID implementation there is. When your phone rings, Address Book will pop up a window with the name and phone number of the person calling, shown in Figure You can choose whether to answer the call, send the caller straight to voice mail, or send back an SMS message.

While not nearly as portable as SMS on a mobile phone, using a regular keyboard with SMS can help you be more expressive much more quickly.

Incidentally, one good application for SMS messaging is in situations where mobile phone coverage is flaky on one side or both sides of the conversation.

A low bandwidth message that gets through no matter what can be infinitely more useful than a high bandwidth message that just never gets there.

Windows users who would like to have similar SMS functionality with their Bluetooth phones should check out [Hack 14] for an application that lets you do that and much more.

The Salling Clicker is one of the best applications available for Bluetooth. You can launch applications, control presentations in PowerPoint or Keynote, and use it as a general-purpose mouse.

A trial version, limited to 30 clicks from your remote, is also available. The download package comes with a basic installer, which will install itself as a new control panel and automatically launch.

After software installation, Salling Clicker appears as a new item in System Preferences. When you open the new preferences item, a small circular icon will also appear in the menu bar, as shown in Figure Click Select Phone, and ensure that your phone is on and somewhere near your computer and that you have Bluetooth enabled on your Mac.

Select your phone from the list and save the changes. You can now use your phone to steer Mac OS X, as well as to publish custom menus to the phone itself.

Under the Clicker Items tab, you can create custom menus of whatever you like and publish them to your phone.

Control Mac OS X by navigating these menus on the phone and selecting what you want to do, such as launch an app or skip to the next track in iTunes.

Some phones such as the Sony Ericcson T even allow you to use the phone as a mouse, making it possible to control any application. In the downloaded Salling Clicker package, locate and launch the installer program for your particular phone.

This will activate Bluetooth File Exchange to transfer some necessary Salling Clicker files to your phone.

Depending on your phone and its particular security settings, you might either need to enable file transfers, or click Yes on the phone to allow the transfer.

Now your smartphone or PDA is ready to connect to Salling Clicker, just as you connected a regular phone in the previous section. Also, make sure your Mac Bluetooth is configured for Discovery; otherwise, the phone will never find the Mac.

You can control this functionality by looking under the Phone Events tab, shown in Figure For example, you might want Clicker to pause iTunes and turn on the screensaver whenever you leave your machine.

The program comes with many default events, and you can click Show More to select other scripts to run at specified times.

The actions are just AppleScript snippets, so anything that you can do with AppleScript can be triggered with the phone. You can edit existing actions or create your own by Control-clicking in the Scripts section under the Clicker Items tab in the Clicker control panel, as shown in Figure Clicker comes with handy actions for remotely controlling slideshows in PowerPoint or Keynote, and since it can simulate any keystroke, it can be used with just about any other application, too.

It is particularly handy when making presentations, because you are virtually guaranteed to have your phone with you and it is likely to be charged.

The latest version of Salling Clicker, if used with Microsoft PowerPoint , will preview the title of the upcoming slide on your phone.

When most people think of Bluetooth, they think of voice or data applications, but Clicker is a clever app that transcends the traditional cable replacement idea.

If you use Mac OS X and own any of the supported phones, smartphones, or PDAs, you will probably find all sorts of novel uses for this software.

Check back on the product web page for updates to the program, because this will be a major addition to device support for Salling Clicker. Never fear, Linux users!

You too can control your machine with a Bluetooth phone. Bluemote is a software package written specifically to take advantage of the capabilities of a Sony Ericsson phone.

We tested it using a T, but several other models from the same manufacturer should also work. Many of the steps in this hack are similar to the next hack [Hack 10].

In fact, Bluemote was inspired by the bluexmms application, extending this control to the operating system. Uncompress the Bluemote package. In the newly created bluemote directory, there is a compiled bluemote binary file.

The author states that the binary was compiled under Fedora Core 1, and we had no problem running it on later versions of Fedora Core or Ubuntu Linux.

The source code is also provided, should you wish to compile it yourself. Next, uncompress the scripts package. To take advantage of the scripts for volume control, you will need to install the aumix software.

Ubuntu and Debian users can install it with apt-get install aumix. In the unpacked Bluemote source code package, you will find a file called bluemote-example.

Copy this file to the new. Chances are that your phone is paired with your computer using channel 1. You can determine this by executing rfcomm without any parameters:.

Bluemote requires your phone to use channel 4. This is easily accomplished by running the following command using sudo or as the root user:.

You can confirm this was successful by executing rfcomm again with no parameters. Now, you can run bluemote from the command line. If you wish, you can append --log to have the program save debug information in the.

If everything has been done correctly, your phone should now prompt you to accept a new connection from your Linux machine. This option seems to work only partially using the joystick, but you can use keys 5 and 9 to move side to side, and keys 6 and 8 to move up and down.

Key 1 performs mouse clicks. If you own a Sony Ericsson phone and use Linux as your primary operating system, you really should check out this free and convenient program.

Use your Bluetooth phone to control your music remotely under Linux. Make sure your phone is paired [Hack 4] with the Bluetooth interface on your computer.

You can now control XMMS directly from your phone. Unlike the T68 apps just listed, which rely on the computer to establish a connection to the phone, Bemused instead uses a client that initiates the connection from your phone to a server running on your computer.

First, unpack bemused. Then, download bemusedlinuxserver. Run bemusedserverlinux from the command line.

At this point, you should be able to fire up the Bemused application on your phone and have the full power of XMMS at your fingertips, from clear across the room.

The hackability quotient of Bluetooth for this particular kind of application is pretty high. Bluetooth can do this and much more. Read on for more hacks that show you just what you can do with a Bluetooth device and various computer operating systems.

Since time immemorial, slideshows have been a dreaded tool of oppression and tedium. Thanks to the ubiquity of mobile phones with both cameras and Bluetooth, the institution of photographic slideshows can now be thrown open, willy-nilly, to the viewing public as both a read and write medium!

Allowing people to contribute photos from their phones to a participatory slideshow can offer interesting and often quite entertaining results.

The concept of this hack can certainly be adapted to other operating systems, but the implementation shown here is specific to the Linux Bluetooth stack and to the X11 Window System used on most open source operating systems.

The best Linux distros for this purpose are Debian or Ubuntu, because all of the pieces are already available through apt-get.

Next, plug in your Bluetooth adapter, and make sure the kernel can see it by running dmesg and checking for a suitable notification towards the bottom of the output.

If your Bluetooth adapter is built-in, dmesg grep -i Bluetooth is your friend. These settings turn off Bluetooth security thus allowing anyone to send files to the Bluetooth device , set the name of the device to slideshow , and allow anyone to scan for it.

Naturally, once you no longer want anyone sending anything to your computer, you should copy your backup of hcid. On other Linux distros, hcid.

There are a ton of these out there, with the most popular possibly being GQview and feh. Again, both of them are available using apt-get.

Check the Random and Repeat boxes, and set the delay to something short, like five seconds, as shown in Figure Finally, seed the slideshow with a single file, which can be an image of anything.

The following shell script accepts images via Bluetooth and displays them in fullscreen mode using GQview:. You might need to run this bit as root first, or change the script to use sudo for that line, and then type in your password when you start the script.

Once in that directory, the script starts up gqview to run in the background, in fullscreen slideshow mode. Our script moves that file into the current directory, where gqview will automatically detect its presence and add it to the slideshow.

Finally, we loop back to run obexserver again, and so on. To stop the slideshow, hit Ctrl-Q to get out of gqview , and then Ctrl-C in your terminal to kill the slideshow script.

The nice thing about using GQview, as mentioned earlier, is that it regularly scans the current directory for new files, unlike feh , which scans the directory contents once at startup.

If you wanted to use feh instead, you could do the following in the slideshow script, which restarts feh every time a new file arrives:.

The principle is basically the same, however. Enjoy your new participatory slideshow! If you use this idea at a party or other gathering, please do let us know how it works out for you.

Tired of one letter typing on your phone keypad? Send complete SMS messages from Linux instead.

What this means practically is that you can treat your Bluetooth phone as a modem, and send it standard AT commands, using any serial terminal program like gkermit, minicom , or screen.

Here is an example using the screen program:. In this case, the phone is capable of all three. If your cell phone supports this capability, you can work with text messages using AT commands.

Most PCs, aside from some newer laptops, do not come with built-in Bluetooth. Some of these devices are low-power Class 2 devices, transmitting up to 10 feet, while other Class 1 devices have extendable antennas and claim to cover upwards of feet.

Windows requires drivers to operate with your Bluetooth device. Windows XPcomes with built-in Bluetooth driver support, and if your USB device is recognized when you insert it, we recommend that you use the Microsoft drivers [Hack 2].

In our examples, we were not able to get our USB Bluetooth adapter to work with the third-party drivers that shipped with the unit.

Uninstalling those drivers and allowing the Microsoft drivers to detect the device resolved the issues. If you are in doubt about the capabilities of your Bluetooth phone, check that site for more information on device support.

Setup and capabilities in these programs vary from phone to phone, so be sure to check to see if your phone is supported. In addition to a Bluetooth adapter, PuppetMaster requires Windows or XP and one of the following mobile devices with Bluetooth onboard:.

Installation of the software is simple. Accept all of the defaults. Once PuppetMaster has been installed, run it from the Start Menu.

A circular icon will appear in the taskbar, indicating the program has loaded, and you should see the status window shown in Figure If you are using non-Microsoft Bluetooth drivers, you might need to pair your phone with your PC ahead of time.

Instead, we selected the Preferences button in the dialog to open the PuppetMaster Preferences window, as shown in Figure At this point, enable Bluetooth on your phone to make it discoverable.

In either case, you will be presented with a list of appropriate device connections that PuppetMaster found Figure Choose your phone from the list and click Add.

Confirm the choice to add your phone to PuppetMaster. To complete the setup, click Connect in the Preferences dialog. Now that you are connected, you can control many aspects of your PC directly from your phone.

As shown in Figure , you can add menu categories in PuppetMaster, and then add items to those categories to expand your control options.

Most importantly for presentations is the ability to control PowerPoint. You can perform system commands such as shutting down, activating the screensaver, or browsing files.

Another great function for presentations is Mouse Mode. On phones that have a directional control, such as the T, you can direct the mouse cursor remotely.

One final set of abilities that PuppetMaster gives you is Events. As shown in Figure , you can set up special events to occur when the phone comes in range of the PC, when it leaves range, or when you get a call.

Events are handy if you are using your phone as a media controller. You can have iTunes pause the currently playing track when your phone rings, so you can hear your caller.

If your phone goes out of range of the PC, you can make it assume that you have left and activate your screensaver, set your status to Away in your IM program, and mute the speakers.

While it does allow you to control your PC remotely from your Bluetooth phone, it also is a complete synchronization utility, allowing you to edit your phone contacts; store, sort, and send text SMS messages; and much more.

Many other phones have been tested, but there is no central list of known working phones. You will need to search for your phone by clicking the Tested Devices link on the FMA web site, which will take you to a SourceForge bug reports page.

The program is also somewhat different from PuppetMaster in that, in addition to Bluetooth, it also supports infrared and serial phone connections.

For serial support, you can use Windows 98 or greater; infrared requires Windows or greater, and Bluetooth is supported on Windows XP only.

Bluetooth requirements are the same as for PuppetMaster. FMA supports both native Microsoft Bluetooth drivers and third-party drivers. FMA can talk to your phone in several ways.

As shown in Figure , you can tell FMA which COM port has been mapped to the phone; you can specify the MAC address of your phone for the Native Bluetooth drivers; and you can also use infrared if your phone supports it.

The first is the selection of components, shown in Figure If you opt to not install the Microsoft Components, FMA will not work correctly until it is reinstalled with the components.

Secondly, you can customize the installation as usual by choosing where icons are created, as shown in Figure You need to make sure to include at least the two top Microsoft components; otherwise, FMA will not function.

It would be nice if there were documentation to cover this with the package. Once the program completes installation, it will launch automatically.

A phone icon will appear in your taskbar, showing that the program is running. The main screen of FMA, shown in Figure , should give you a pretty good idea of what the program is capable of.

FMA gives you complete control over your text messaging. The New Message window is shown in Figure You can also view new messages in your Inbox, organize them in the default folders shown, or create new folders to categorize your messages.

The program also gives you control over your contacts, both in phone and SIM memory. As shown in Figure , FMA lets you assign custom icons to a contact, and give them a custom ringtone.

You can also set the preferred number for the calling contact, as well as associate each contact with a specific contact in Outlook. When a new call arrives, you will get a Caller ID pop-up window on your screen, as shown in Figure If you have a headset connected to the PC, and the correct Bluetooth Audio settings turned on, you can use your headset to answer and receive calls.

You have complete call logs of all incoming, outgoing, and missed calls. This can be a real lifesaver when you know that you called a client 37 days ago and left a message, but they tell you no one ever called them.

Print out the log and send it to them as proof! You can also browse the files on your phone. Tired of those hideous background pictures that come by default?

Delete them. Sick of those horrible MIDI files that you get for ringtones? Delete them! Even better, replace them with custom pictures and MIDI files.

There are millions of MIDI files available for free online. You can really manage all aspects of your phone from FMA. It will even let you power off the phone or lock the keypad of the phone from your PC.

Lastly, you can control your PC. There are also controls for PowerPoint and two mouse modes to control the PC mouse from the joystick or keypad.

FMA also provides a General Tools menu on your phone that allows you to turn the PC display on and off, lock the display, start the screensaver, and log off the current user, as well as hibernate, shutdown, and restart.

FMA does have scripting support from the Microsoft Script tools that it downloaded during installation.

Have you ever wanted to do something on your computer from across the room? How about from the other side of the world?

It can be useful to be able to access your desktop machine remotely. You could check server logs, restart failed services, or even post to your weblog.

If you have a home network, you can set up all of your computers so that they are accessible remotely. Virtual Network Computing VNC is an open source application that is designed to allow one machine to control another machine over a network.

It was originally developed at Bell Labs. VNC is also useful for collaboration. Multiple viewers clients can connect to the same server.

Each viewer has its own cursor. You can use these cursors to point to content on the remote machine. The viewers display the cursors for all of the other viewers as well.

Each cursor is displayed differently from the others so you can tell them apart. The server side comes in Windows, Mac, and Linux flavors.

There are other versions of VNC available as well. You will also need an application to access the server.

In typical computer-speak, this application would be called the client , but VNC uses the term viewer instead. For example, their SlideShow Commander is a specialized application for remotely controlling PowerPoint Presentations.

To access your desktop remotely, you need to know its external IP address. All you have to do is look up your IP address in the appropriate place and write it down for use in setting up PalmVNC.

If you have a dynamic IP address e. An IP publishing service will typically let you choose a hostname within their domain.

You end up with a name like hostname. Keep this symbolic address handy for setting up PalmVNC. An IP address uniquely identifies any computer on the Internet.

It is used for routing sessions to the appropriate machines. An IP address is a four-part number. Each part is a number in the range 0— The numbers are separated by decimal points.

Thus, an IP address can look like Most people at least at home have dynamic addresses. A dynamic address is assigned by the ISP on a periodic basis.

To connect to a computer over the Internet, you either need to know its IP address, or you need to have a name for it e. If you have a dynamic IP address, you can hook up with a free service to publish the address.

You get to choose a hostname for your computer within the domain names offered by your service. Then you can refer to your computer via hostname.

Some service providers are No-IP. Download and install the appropriate version of VNC on your desktop machine. After VNC has finished installing, run the configuration part of it.

You will be able to choose a password for VNC, as shown in Figure Choose a good password at least eight characters and a mixture of upper and lowercase characters, numbers, and punctuation.

This password is all that is needed to access your machine over the Internet, so choose carefully. Either write it down or remember it; you will need the password when configuring PalmVNC.

When you run OSXvnc, you will see a screen similar to Figure Select a display number usually 1 and port usually Set a password; this is the password you will use when you log in from PalmVNC.

When everything is working and you are connected, you should see a screen on your Palm device that looks like Figure You will need to open some ports in your firewall for VNC, and VNC itself needs access to ports on your computer.

By default, VNC sends information including passwords as plaintext. You will need to open port 22 in your firewall for SSH, if you have not already done so.

For other VNC servers, the process is fairly simple. From the client side of a desktop machine, you want to run something similar to the following:.

Whenever VNC is running, it will look for incoming connections. If you have a personal firewall e. By default, VNC uses ports and port is only used for a Java-based viewer , but you can change those ports under the Connections tab.

You can create multiple VPN accounts for connecting to different machines. Set the account name in the Account edit box.

Note that this name is only used to distinguish between different setups in Mergic. You can also choose to have Mergic VPN autoconnect to the server when specific applications are run.

Start by creating a new network connection from the Network Connections section of the Control Panel. Select an Advanced Connection, as shown in Figure The next dialog box lets you select the advanced connection options.

Select Accept incoming connections, as shown in Figure Next, choose the device that you want to allow VPN connections from.

Then, you will need to allow VPN connections in the dialog box shown in Figure After that, select the users that you want to allow to use VPN.

You will need one of these usernames and the corresponding password when you set up Mergic VPN. Unzip it and install palmvnc.

Set up a new connection to your desktop machine, as shown in Figure Enter the IP address for your desktop machine and the password you used when setting up the VNC server, and then tap OK and Connect from the next form.

If everything is working, you should now see your desktop on your Palm device. You can move around the desktop by using the narrow scrollbars on the right and bottom of the screen.

At scaling, you can view a x desktop on a x Palm device or even up to a x desktop on a x Palm device.

No matter which operating system your desktop is running, you can still control it with PalmVNC and an appropriate server.

Make sure that you use an appropriate level of security for the environment you are in running over a local network or running over the Internet.

Your Palm can take the place of all of them. You need software to convert your Palm into an infrared IR remote. You should look at the home theater devices that these two programs support and pick the one that is compatible with your gear.

Some of the free apps have mixed results, but a basic guideline for choosing one is to select them by the developer. There are a number of companies that sell tools for building various applications or IoT devices or both that write decent free Bluetooth apps for testing from your phone.

These are usually fairly high quality because they are intended to complement your development process while using their purchased products.

Figure 7. From the above, you can see it is useful in finding unusual items. This was captured mid-flight during a business trip.

Figure 8. Excellent app with decent logging capabilities. Most of the hardware and even some of the software comes with Wireshark plugins compile and install all of them.

While there are too many to name and plan for, there are some general rules to keep in mind. Read the documentation, but note the date.

If the instructions are old and refer to an old version of Wireshark, it is possible that the plugin comes included with the newer version of Wireshark.

Most plugins will compile without incident with a newer version of Wireshark. In fact, most will compile with the Wireshark development package for your Linux version, for example, wireshark-dev on Ubuntu.

The purpose of the plugins is simply to interpret the raw Bluetooth packets inside the Wireshark app into something a little more readable, and since there are multiple protocols involved with Bluetooth, it helps to make some sense out of what is going on.

There are often a couple of different ways to sniff Bluetooth - directly within Wireshark and with one of the command line tools itself. For example, Ubertooth includes the aforementioned ubertooth-btle, which allows capturing of Bluetooth traffic and saving the data in pcap format that Wireshark can read and interpret with the appropriate plugins.

And you can use more than one Bluetooth source during sniffing within Wireshark. If you are using one dongle to probe a device and another trying to flood it at the same time, you can see the results from both in the same sniffer session.

And it helps when testing how one dongle or CLI performs against the other. This also involves simply documenting what the device does during various stages.

For example, can more than one device pair to it? Does it begin advertising itself immediately after applying power for the first time, or do you have to perform an action such as a button press before it will allow pairing?

Does it cycle through periods of advertising versus not advertising, perhaps in an effort to conserve battery power?

But even more importantly, seeing how much information can be read remotely to fingerprint or otherwise determine information about the device - particularly as the state of the device changes.

And this gets into the second area. Things such as the name of the device or a model number can come in handy. Often when fingerprinting a device, you find information that will assist your IoT investigation in other areas - such as Bluetooth chipset and perhaps firmware versions associated with that chipset.

Being able to remotely determine the firmware version down to the exact build version can be a massive timesaver - particularly if you are able to find firmware versions online.

With a little Googling, determining the Bluegiga chipset and the build version of 71 helped determine the exact firmware version from Even poking around with freeware apps on a phone can reveal interesting info:.

Figure 9. In the above example, the model number string of BLE coupled with the hcitool output with Bluegiga and the build version helped confirm the exact firmware.

For the record, using the command line tool gatttool one could also determine the exact same information, although not presented nearly as cleanly. The character properties values are interesting - for example, 02 is read only char properties: 0x02 , and 0a is writable.

Finding all of the interfaces that allow for the external writing of values is an important part of examining the attack surface, and having all of the UUID values are great for when it comes to grepping through decompiled code.

This allows you to potentially map values that are inputted into the IoT device and see how these values are processed by, for example, the accompanied app on the phone.

Bluetooth can be imperfect, and it helps to run tests several times. For example, look at the results against a device, ran within a couple of minutes of each other:.

The first one did not receive a complete answer, while the second one did.

You can look at these for inspiration. You should keep in mind what you want to do with each button layout that you create.

For example, a common layout is watching DVDs. You could combine these actions into a macro, then have a single Power button that turns everything on.

You might also need volume, play, pause, stop, fast forward, rewind, menu, and arrow keys. A button layout for watching TV might include a number pad, and channel-up and channel-down buttons.

Fortunately both companies also provide hardware versions of their products. You will need to find a used Visor. The Visors have a Springboard slot in the top that can take plug-in modules.

All you have to do is stick the OmniRemote module into the Visor. The software is pre-loaded on the module. NoviiRemote makes a product called the NoviiRemote Blaster.

This is an SD card that functions similarly to the OmniRemote product, except that it works with SD-compatible devices such as recent Palm-branded devices.

Make sure that the software or hardware that you want to use is compatible with your PDA. If not, consider buying a cheap Palm to use as a dedicated remote control.

Even if you plan on buying a hardware device to install in your PDA, start by downloading the corresponding trial software—you need the software to check that it can control your device.

You can easily switch between different devices, as shown in Figure Use the trial version of NoviiRemote to make sure that the controls work.

Start with the default codebases collections of remote control codes that came with the software. For each device you want to control, try out the included codes to see if the functions you want to use work.

Download these and try again. OmniRemote, shown in Figure , provides macros in addition to the standard buttons. A macro can combine multiple actions e.

OmniRemote supports a different set of devices natively than NoviiRemote. Use the trial version of OmniRemote to make sure that it can control your devices.

You need to either program all of the buttons yourself if you have the corresponding remote controls , or you can try to find codes on the Web.

This program is called CCF Converter, and it converts remote control libraries from. CCF format to the internal format that OmniRemote uses.

These databases are the. CCF files that you can convert. If you find files that seem to match your home theater devices, then download them.

You will need to unzip the files as well. Run CCFCnvt. You will see a screen similar to Figure For each file, look for the device that you want many of the CCFs are for a set of devices so you may need to experiment to figure out which file corresponds to the device you want.

When you have collected all of your devices, then select Create PDB File to generate a new database with your devices in it.

One of the nice features of OmniRemote is that you can create macros. To create a macro, start by creating a new button and select Macro as the type of button.

Then click on the Edit Macro button and hit Insert. You will be prompted to tap buttons to add them to the macro. Either of these devices can simplify your remote controls.

You will end up with a single Palm device instead of a stack of remotes. You also have the ability to create sophisticated macros to handle multiple common chores at once.

You can see an example of creating a macro to turn on the TV, increase the volume, and switch to channel 25 in Figure Macros can give you a lot of power in a single button.

With a few macro buttons on a single page, you can easily perform a number of functions. Will you send and receive email on the phone? Do you plan to send a lot of camera phone pictures or video clips?

How about posting to your weblog [Hack 18]? And most important, will you use your phone to connect tether your laptop to the Internet [Hack 4]?

We will use the word tether even when referring to wireless methods of using your handset, such as the Bluetooth connection. Data plans come in two flavors: metered and unlimited.

With a metered plan, you get anywhere between 1 and 20 MB per month as a base allotment, and if you go over, you pay by the kilobyte.

There are two types of unlimited plans: handset plans and really, honest, we-mean-it unlimited plans that let you use your phone as a wireless modem for your laptop or PDA.

The underlying wireless network technology is known as the data bearer of the mobile data. The GSM network provides data access over the phone data calls.

It works in the same way as the dial-up modem on a PC. The benefit of this technology is that it is available everywhere you can get coverage.

However, the drawbacks are the slow data rate between 9. Since the call must be connected for the entire data session, it counts against your airtime minutes.

If you want to make a voice call, you must first disconnect the data call. GSM data is known as 2G second generation. The GPRS network allows the phone to have direct access to the packet-switched data from the network.

The phone does not need to dial any calls. This feature allows the phone to have always-on access to data without using up airtime minutes.

GPRS is known as 2. The data speed of 2. The EDGE network coverage is still limited. Only a handful of devices released since support the EDGE data bearer.

It offers broadband data speeds of around Kbps. However, UMTS coverage is very limited. In the States, it is currently available in only a few selected cities.

In addition, UMTS service plans can be very expensive. Which data bearer is available to you depends on your wireless operator, your location, and your service plan.

If your current service plan does not include any data service, you can call up your wireless operator and add it for an extra monthly fee.

The data service is typically metered by the bandwidth you use in a billing period. This could be the hard part, but the good news is that you can just take a best guess.

Here are some considerations:. As such, you could get away with a metered data plan. If you plan to connect your laptop to your cell phone to get online, welcome to what some folks think is a gray area.

However, anecdotes abound concerning people who claim to have received nastygrams from their cellular operator after using large amounts of data in this way.

For example, every web browser transmits a User-Agent identifier every time you load a page; this is a dead giveaway.

Some providers will bill you differently based on your usage. All those guidelines aside, the best thing to do is choose an unlimited data plan, if one is available otherwise, pick the most generous metered plan.

If you plan to use your phone as a wireless modem for your laptop, you should definitely choose an unlimited plan that supports tethering.

Table shows a few unlimited data plans that were current as of this writing. If you think Table looks very U. In other parts of the world, metered data plans are more common.

And the States has its share of those as well. Table shows some of these plans, from the low-end to the high-end offerings, and includes the range of charges you can expect if you go over the metered limit.

However, most providers will let you add or change your data plan at any time. But before you make a change, ask the all-important questions: will this require me to agree to a contract extension, and will I be charged a termination or activation fee to make this kind of change?

One problem you might run into is a customer service rep that is unfamiliar with the plan you want. The best thing you can do is make sure you know the name of the service.

The data plans available to you might depend on what level of voice service you have. Although most providers will prorate the new plan after you change it, make sure you understand what exceptions are in place between the date you change the plan and the date your billing cycle resets.

For example, suppose your billing cycle ends on the 28th of each month, and you are just shy of the 20MB limit on a metered plan when you switch to an unlimited plan on the 23rd of the month.

You might think that you can use as much data as you want between the 23rd and 28th, but be sure to ask—when it comes to cellular billing, nothing is as simple as it appears.

Use a mobile blogging service to post blog entries with pictures from your mobile phone. Not long ago, bloggers could only update their blogs using a computer.

Inspiration, however, does not always coincide with the presence of a bulky computer. At the turn of the century, some adventurous and creative bloggers started blogging from their mobile devices.

The word moblog was thus coined, referring to blogging from a mobile device mobile phones, PDAs, etc. If blogging without a computer is convenient, moblogging with a camera phone is exciting.

In just a few clicks you can snap a quick shot and add a few punch lines, and minutes later the neatly formatted post on your personal blog can be shared with the entire world!

The dry spell between November and March? There are two major approaches to moblogging, regardless of the myriad phone models and their different capabilities: SMS moblogging and email moblogging.

This hack introduces and compares these two methods, with an emphasis on the latter. Instead of email, you can also use MMS to post blog entries from your camera phone.

SMS moblogging works on any handset that can send SMS, which is virtually every mobile phone nowadays. You write the blog entry on the mobile phone and send it via SMS to a service phone number provided by a moblog service.

The moblog service interprets the received SMS message and posts it to your blog. Txtsolutions can host your blog on its own site, or post your blog entries to your account in a list of supported third-party blog hosts.

If the SMS moblog service posts the blog entries to a third-party blog host on your behalf, it needs to know your login information on that third-party site.

Despite the meager prerequisite of the handset, SMS moblogging has some major drawbacks. First is the nagging character limitation for SMS.

Second, even if you are laconic enough to squeeze each of your posts into fewer than characters not words , SMS moblogging is text-only.

Third, you need to pay extra to the SMS moblog service provider. This charge is in addition to your regular SMS fee from your wireless operator and cost for the blog hosting service if it applies.

You can post photos from a camera phone, adding richness to your post. There is no extra charge besides what you pay for the wireless data and regular blog hosting service.

Email moblogging works in much the same way as its SMS counterpart, except that you send email from the phone to a hopefully secret email address.

The email Inbox is polled by the moblog service at regular intervals e. When a new message is detected, the moblog service retrieves the message and parses the content.

If the moblog service supports picture attachments most do , you can even have a mobile photo blog! It is important that you keep the email address private.

Any message sent to that email address will be automatically posted on your blog. The easiest way to set up an email-based moblog is to use a blog hosting service that supports email posting.

It typically takes only a few minutes. After you open a regular blog account at the hosting service, there is usually a field under the user preferences screen where you can set the private email address.

All emails sent to this address will be posted to the blog you just opened. Most popular blog hosting providers now support email posting from mobile phones, either free of charge e.

Table compares several providers that emphasize moblog support. Moblogging feature available for all account types; 50MB storage and 1GB per month bandwidth for basic subscription.

Cost includes desktop blog software and one year of hosting. Email attachment posting requires additional software; 40MB storage. Besides the major blog providers, some new providers specialize in moblog hosting.

Both of them offer free accounts for users to blog directly from their mobile phones. The free accounts often come with the condition that the service provider can display advertisements on your blog pages.

The aforementioned photo moblogging solutions tie you into specific blog hosting services. But in many cases, you do not want this tie-in:.

Your favorite blog host might not provide photo moblogging features. Is there a service that is free and independent of your blog server?

The one feature that makes Flickr really interesting from a moblog point of view is that it allows you to upload photos to Flickr by email and create a blog entry at your designated blog site.

The blog site can be any of the blog hosts mentioned in the previous section, or even your own web site running popular blog server software. The post includes the email content as its main body and an inline thumbnail, which is linked to the picture stored on Flickr.

The thumbnail posting feature in Flickr is really cool and sets it apart from other services, especially if you have a camera phone that produces megapixel pictures.

Without resizing to thumbnails, megapixel pictures would clutter up your blog and mess up the web page layout e. The free account at Flickr allows you to upload up to 20MB of photos per month.

Considering most mobile phone moblog attachments are smaller than KB, the free Flickr account is more than sufficient for even the most aggressive mobloggers.

Combining the Flickr email posting service with a free blog hosting service or your own blog server , you can set up a powerful and free moblog with photo posting in no time!

Figure shows the information Flickr needs to post to your blog site on your behalf. Obviously, it needs to know your site address and account credentials.

Figure shows the private posting email addresses Flickr provides to you when you open an account. One address is for adding pictures to your Flickr account, and the other is for adding the pictures and then posting thumbnails to the designated blog.

The default email application on many phones restricts the size of an attachment to a maximum of KB. To get around this limitation and to provide a more integrated user experience, you can use a phone application that takes pictures and then automatically posts them to Flickr without having to switch applications and enter email addresses.

Many power bloggers run their own blogging server so that they can have complete control over the content and presentation of their blog.

If you want complete end-to-end control over your moblog, you can customize existing blog server software to make it support email posting with photo attachments from a mobile phone.

In this hack, you will learn how to set up the popular WordPress blog server to support photo moblog postings. Running your own server also gives you complete access to web site visitor statistics, the ability to back up the web site, and many other features.

It is available free of charge from the WordPress web site. After creating a user account, you can start to post and publish blogs on your very own blog server now!

Out of the box, you can use Flickr to post photos to your freshly installed WordPress server. In the rest of this hack, I will discuss how to set up WordPress so that you can moblog with it without needing a third-party service.

WordPress supports email posting, albeit with two main drawbacks. First, it does not support email attachments. Anyone can send email to the email address and have their messages appear on your blog.

Without sender-address filtering, your moblog can be easily flooded with spam messages. Applying the patch is straightforward. First, download the file wp-mail Unzip the archive to the WordPress root directory.

This adds the files PEAR. Now, create two directories, wp-photos and wp-filez , under the WordPress root directory to store images and other attachments, respectively.

You can choose other directory names as long as you remember to modify the corresponding settings in the new wp-mail. If you want automatic picture resizing an important feature for megapixel camera phones , you need to install an additional hack provided by Hugo.

Simply replace the default wp-mail. Make sure you enter the correct server and login information. Nothing appears on your blog just yet.

That is because the wp-mail. Of course, if you need to open a browser and load the wp-mail. To automate the email polling and blog posting process in WordPress, you need to schedule a recurring task that loads the wp-mail.

You can use a fully featured web browser, such as Firefox, to load the wp-mail. But that is a huge waste of server resources.

You should append one line to the bottom of the file, save it, and exit the editor. The preceding line in the cron control file schedules the system to run the curl command every five minutes in every year, month, week, and day.

You now have a fully functional photo moblog server. If you do not want to use the default editor, you can always export the cron control file to a text file, edit it externally, and then import the edited file back to crontab.

See the crontab manual for more information. Turn your Java-enabled cell phone into a portable mapping appliance. If you have a GSM phone from the last three years or so, you probably have a powerful mobile mapping appliance in your pocket.

Mobile GMaps is a free program that lets you view Google Maps on your cell phone. Then click on the Download link, and agree when it asks if you want to download and install the application.

Click on the application, and then select Start from the Options menu. By default you will see a map of the United States fully zoomed out.

You can navigate with the 2, 4, 6, and 8 keys. Figure shows Mobile GMaps on a Nokia Satellite flips you to Satellite imagery. Zoom brings up a menu that lets you zoom in, zoom out, or select a zoom level from 0— Locations are like waypoints on a GPS.

You can set latitude, longitude, zoom level, and map or satellite view, and then return to that view from the Location menu.

Search brings up a search screen that calls the Google search system. There are a number of tricks and hints on the GMaps web site.

Mobile GMaps was written by Cristian Streng. Caravanning with friends, but only one person has a GPS? Play nice and share.

Road trip caravans are more fun when the people in the two cars can communicate with each other. If you want to exchange data instead of voice over radio, you can set up a roving Wi-Fi network and then share a GPS between vehicles.

Connect a GPS to one computer and then set up a wireless network. Clients in other vehicles can connect to the GPS on the host machine.

Normally, only one program at a time can access a serial port—connected GPS. This can quickly become a problem.

You probably want to run gpsmap [Hack 22] to get maps, and then a program to log your position, and perhaps another program to let you create spatial annotations of your travels.

That is way too many connections for a single-user serial port! Fortunately, GPSd is available as a daemon that connects directly to the GPS and then acts as a server for position information.

You can build and install GPSd in the standard way, as shown here, but do follow any current instructions from the web site replace x.

If you have problems getting GPSd to start, consult the documentation. Now you are connected to GPSD. The commands are single characters, and you can chain them together.

You will get the full GPS position, with your latitude and longitude, altitude, current date and time, and GPS status. You will get coordinates, the altitude, and current date at one-second intervals.

Entertain yourself and passing wardrivers by abusing the beacon frame and MAC address. Have you ever wanted a lightweight protocol that would allow you to broadcast your current position?

Perhaps the access point has a more powerful network card, or a better antenna, and is able to blast a signal out, but you are not able to get your signal back to the access point.

What to do? With a complete abuse of the These are about 50 bytes long and contain information that a client needs in order to associate with a wireless network.

Wireless discovery programs such as NetStumbler [Hack 24] , iStumbler [Hack 27] , and Kismet [Hack 29] get all of their information from sniffing for these beacon frames.

So what happens if we change the SSID on the access point? What happens if we change it whenever we get a new GPS fix? For our purposes the SSID, at 32 bytes, provides enough room to encode the latitude and longitude of our current position to 5 digits of precision about 1 meter.

We can also separate the coordinates with readable delimiters and still have 11 characters for a unique station ID. Once you have your access point and GPSd functional, use the Perl script in Example to broadcast your current position by using the beacon frame.

In this example, myid is the unique station ID that will preface the latitude and longitude in the SSID generated by the code.

This is because the programs use the MAC address of the wireless card to uniquely identify the access point. By design, this is the right thing to do, because MAC addresses are not supposed to change.

Unless we want them to change. This is almost certainly a Bad Idea, but it does let you create amusing Stumbler logs like Figure for passing wardrivers.

You could add a wireless card to the computer to serve MP3s in your art car and broadcast your position with GPS. Since the beacon frame drops down to 1MB and is sent relatively infrequently, you could have quite a few location-aware vehicles sharing a single Wi-Fi radio channel.

This hack lets you communicate your position or anything else you can convey bytes at a time to a client and there is no way for the server, or anyone listening in, to identify which clients are getting the position information.

More on Use these two powerful Linux tools to map out the locations of Wi-Fi networks. You can make it even more powerful by combining it with Kismet [Hack 29] , allowing you to physically map locations of wireless networks.

In order to make this work, you will need to have both GPSd and Kismet installed and functioning with your Linux system. Consult the hacks on both pieces of software if you have setup questions.

If you plan to do some network mapping with Kismet, keep the following in mind:. Put the computer somewhere safe and out of the way.

Forget that the computer is there while you are driving. If you have to fiddle with it, pull over first. If you can have a friend ride with you who can operate the computer, all the better.

Do not let the computer distract you while you are driving. Make sure that the GPS gets a fix before you start driving. Put the GPS somewhere that it can easily pick up the satellite signals.

Your best bet is to get a magnetized external antenna that can attach to your roof. Be sure that there are no loose wires sticking out of your window.

Above all, when you are driving a car, your first responsibility is to drive safely. Pay attention to the road and drive carefully.

Start GPSd, specifying the serial port with -p and the speed with -s :. When you shut Kismet down, it writes out logfiles. Check the logtemplate setting in kismet.

Kismet writes several logfiles in the logtemplate directory in the following filenames, I starts at 1 and increments each time you run Kismet on a given day :.

Kismet log in semicolon-separated fields, one line per entry. The first entry contains the field names. Kismet log in a format designed to be read by the gpsmap utility, which is included with the Kismet distribution.

To generate a map, run gpsmap on the. See the gpsmap manpage for all the drawing and mapping options. If you choose to use a downloaded map the default , you must be online.

Figure shows a map generated by the following command:. Use -p to show power levels or -e to simply plot the locations of the hotspots on the map see the gpsmap manpage for more options.

Skip to main content. Start your free trial. Hacks 1— Introduction. Set Up Bluetooth on Linux. Installing Bluetooth.

Securing Your Bluetooth Connection. Wait for all phones in range to appear 3. Choose device 4. Tap to crack it 5.

Wait for the hacking to complete 6. Ads: This app is ad supported via notifications and banner ads. You may remove them through app removal.

By installing this app you agree to receive them. A basic set of commands was established as a standard in the mobile communications industry; on the other hand, smartphone manufacturers include their own AT commands to run multiple functions.

It is required to pair the peripheral device speakers, headsets, etc. The AT commands is then sent to the Bluetooth component at the application level, where the action related to the sent command is completed.

Not all of these commands are processed or recognized by all smartphones, as this depends on the manufacturers. ATFuzzer, the analysis method developed by the researchers, consists of two modules: evolution module and evaluation module, which interact in a closed way.

The evolution module starts with an initial AT command grammar that mutates to generate Psize refers to population size, a parameter for ATFuzzer , different versions of that grammar.

Specifically, ATFuzzer generates new grammars from the main grammar through the following high-level operations:. To assess the effectiveness and scope of this approach, 10 different models of Android operating system smartphones from six different manufacturers were analyzed.

Upon completion of the analysis, vulnerability testing specialists discovered 4 misbehaviors in Bluetooth and 13 others on USB.

By exploiting these flaws, threat actors could deploy malicious activities such as disruption of smartphone connections, denial of service DoS , and theft of sensitive information.

Although security for baseband processors and command interfaces has improved markedly over previous generations of smartphones, it is obvious that with current security measures it is impossible to properly analyze and filter an anomalous input.

Handy Bluetooth Hack Video

22 GENIUS TECH HACKS TO MAKE YOU SAY WOW Auf älteren Smartphones kann es nämlich zu Paribas Open Bluetooth Hack kommen, wenn ihr nicht aufpasst. Um selbst Kommentare schreiben zu können, musst du JavaScript in deinem Browser aktivieren. Super Bluetooth Hack Jetzt Spielen D. Leserbrief schreiben. Github via Heise. Diskutiere auch gerne mit uns in den Kommentaren. Noch Fragen offen geblieben?

Handy Bluetooth Hack So schützt Du Dich vor Angriffen über Bluetooth

Bereits in den er Jahren Kostenlos Spin De, sollte es allmählich die klassische Übermittlung per Kabel ablösen — und das mit Erfolg. Es ist nicht nur aus Sicherheitsgründen sinnvoll, Bluetooth nur dann zu aktivieren, wenn die Funktion benötigt wird. Super Global Test Mrket Hack konfigurieren. Um selbst Kommentare schreiben zu können, musst du JavaScript in deinem Browser aktivieren. Einfach erklärt Bluetooth vs Wifi — Unterschiede und Vergleich der Funktechniken Aber generell abschalten kann man es vermutlich nicht. Da hierfür wieder die Bestätigung des Nutzers eingeholt werden muss, eigenen sich die Funktionen ohne Weiteres also nicht dazu, unbemerkt Geräte miteinander Werde Ich Betrogen Test verbinden, deren MAC-Adresse man nicht kennt. Gerade in dicht besiedelten Gebieten oder im Lucky Jungle von Menschenansammlungen wäre dies durchaus umsetzbar. Das Problem nimmt wohl beim Pairing-Prozess seinen Ursprung, wenn sich also zwei Bluetooth-Geräte miteinander verbinden. Die schlechte Nachricht gleich vorweg: Wenn ihr eines der oben genannten Geräte besitzt, ist es mit hoher Partypocker für einen potenziellen Bluetooth Www Jetztspielen Kostenlos De anfällig. In deutschem Schlachthof Heimliche Aufnahmen offenbaren einen fatalen Irrglauben. Zur nächsten Kommentarseite Selbst mitschnattern. Angreifer können dadurch relativ leicht eine Lucky Slot herstellen und zum Beispiel Gespräche belauschen. Bluetooth ermöglicht die kabellose Kommunikation unter Geräten, kann aber von Hackern Meaning Of Roulette werden. Unglücklicherweise gibt es aktuell nur wenig, was ihr gegen die Gefahr vor einem Bluetooth Hack unternehmen könnt. Du solltest ein Dropdown-Menü mit passenden Ergebnissen sehen. Wie die Funktionsnamen schon sagen, geht man hier Casino Bad Oynhausen einer unsicheren Verbindung aus. Das Dell Inspiron 15 mit Intel Das hat Google wohl übersehen. Apple Apps Tablet-PC. Dies öffnet eine Liste der verbundenen Bluetooth-Telefone. Google hat reagiert und bereits Anfang Februar ein entsprechendes Sicherheits-Update bereitgestellt. Ist dieser Pairing-Prozess einmal durchgeführt, können die Geräte zukünftig auch miteinander kommunizieren, Malaga Tipps sichtbar zu sein. Vielen Dank für Ihre Mitteilung. Es gelten die Regelungen der Datenschutzerklärung. In diesem wird aktiv nach möglichen WFD-Verbindungspartnern gesucht. Gehe auf den Download-Link. Handy Bluetooth Hack The phone does not need Trade Sports dial any calls. Sena UD with included stubby antenna. Configuring PPP Networking. Notify me of new posts by email. This opens a small Winner Casino Mobile for Book Of Ra Gametwist Tricks to type in your message. Contact Us. Bluetooth. Mit der Bluetooth-Funktion können Angreifer Kontrolle über das Smartphone gewinnen. Daher ist es sinnvoll, die Verbindung zu. den Hack auf über 28 verschiedenen Bluetooth-Chips durchführen, zwischen Smartphone und Bluetooth-Lautsprecher bestätigen muss. Bluetooth-P2P-Verbindungen lassen sich mit einem kleinen Hack Smartphone-Nutzer haben irgendwann schon einmal Bluetooth benutzt. Auf älteren Smartphones kann es nämlich zu einem Bluetooth Hack erwähnten Handys verfügt, nutzt ihr Bluetooth und seid potentiell von. Applying the patch is straightforward. This is called tetheringand it allows Starga0es tethered laptop to work with the Internet as if it were connected via a normal dial-up, cable, or DSL modem—except that you are connected through your Treo. OmniRemote supports a different set of devices natively than NoviiRemote. Rogers Canada. In general, for a hacker Wetten Beispiele be successful, he has to Hotwheels.De Spiele within feet of you for a Class 1 Bluetooth device or 30 feet for Class 2. You can use a fully featured web browser, such as Firefox, to Spielhalle Tricks Novoline the wp-mail. Handy Bluetooth Hack

5 thoughts on “Handy Bluetooth Hack Add Yours?

Hinterlasse eine Antwort

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind markiert *