Bluetooth was used to keep the Mac book Air WiFi network
available to host a fake open WiFi hot spot, routing
traffic to the Ubuntu DNS VM. When victim iOS devices
found the open WiFi network and made a request to
http : //www.apple.com/library/test/success.html
our attacker DNS server intercepted the request and redirected
to a malicious page on the Backtrack server hosting
the JavaScript BeEF hook. As long as that page remained
active in the UI WebView instance, some BeEF attack functions
like sending alerts and gathering some device information
was possible.