ECCouncil ECSS Question Answer
William is an attacker who is attempting to hack Bluetooth-enabled devices at public places. Within the target’s range, he used special software to obtain the data stored in the victim’s device. He used a technique that exploits the vulnerability in the OBject Exchange (OBEX) protocol that Bluetooth uses to exchange information.
Identify the attack performed by William in the above scenario.
ECCouncil ECSS Summary
- Vendor: ECCouncil
- Product: ECSS
- Update on: Jul 25, 2025
- Questions: 100