Главная
Study mode:
on
1
RSAConference 2019 San Francisco March 4-8 Moscone Center
2
Structure of the Talk
3
Ubertooth One
4
Bluetooth Overview
5
Linux Logging
6
OS X packet logger
7
Reverse Engineering Process
8
BLE Blood Pressure Monitor
9
Conclusions: BP Monitor
10
BLE Padlock
11
Conclusions: Padlock
12
Classic Bluetooth Headset
13
Audacity
14
Conclusions: Headset
15
BLE Credit Card
16
What is a Bluetooth credit card?
17
Conclusions: Credit Card
18
BLE Electric Skateboard
19
Conclusions: Skateboard
20
Most Common Security Problems
Description:
Explore Bluetooth reverse engineering tools and techniques in this 52-minute RSA Conference talk. Gain insights into the growing IoT landscape and learn how to analyze Bluetooth-enabled devices using readily available hardware. Discover the structure of Bluetooth communications, utilize Linux and OS X logging tools, and follow practical reverse engineering processes. Examine case studies on various Bluetooth devices, including blood pressure monitors, padlocks, headsets, credit cards, and electric skateboards. Understand common security problems in Bluetooth implementations and enhance your skills in assessing IoT device vulnerabilities, whether you're a beginner or an experienced professional in the field.

Bluetooth Reverse Engineering - Tools and Techniques

RSA Conference
Add to list
0:00 / 0:00