Collin Mulliner joined the trifinite.group as the first member in September 2004. He holds a Bachelor of Science in Computer Science degree from Fachhochschule Darmstadt (Germany). As of September 2004 he is into a Masters program at the University of California Santa Barbara. Besides of his studys Collin is active in the mobile computing sector since 1997. Here, he worked on several personal and commercial projects. His other major working fields are computer and network security. Networking protocols, embedded systems and special case operating systems. Recently, Collin is very active in the Bluetooth sector, here he developed one of the first Bluetooth port scanners. Also he has been researching Bluetooth based MANETs recently.
BTClass - Bluetooth Device Class Cloaking
Each Bluetooth device has a device class (type of device and services it provides) which is part of the responds to an inquiry. The device class has a total length of 24 bits and is separated in three parts. First there is the Service Class which is a bit field (first 11 bits) and second and third are the Major (5 bits) and Minor (6 bits) device class.
The Bluetooth architecture consists out of two main protocols, L2CAP and RFCOMM which is layered on top of L2CAP. Since these protocols utilize ports (as they are named in the popular TCP/IP UDP/IP architecture). It makes sense to have the ability to scan these in order to find so called open ports and possible vulnerable applications bound to them.
Blueprinting is a method to remotely find out details about bluetooth-enabled devices. Blueprinting can be used for generating statistics about manufacturers and models and to find out whether there are devices in range that have issues with Bluetooth security. (read more about bluetooth security issues here)