This report provides a comprehensive analysis of Bluetooth smart technology, focusing on the classification of attacks and defenses. It begins with an introduction to Bluetooth technology, its evolution, and its prevalence in various devices. The report then delves into Bluetooth security, exploring different security modes and the vulnerabilities associated with various Bluetooth versions. A significant portion of the report is dedicated to detailing different types of attacks, including MAC spoofing, PIN cracking, man-in-the-middle attacks, bluejacking, and bluesnarfing, providing insights into how these attacks are executed. Furthermore, the report discusses various mitigation strategies and countermeasures to address these security threats, offering recommendations for enhancing Bluetooth security. The report concludes with a summary of key findings and suggestions for future research in this evolving field, making it a valuable resource for understanding and improving Bluetooth security.