Главная
Study mode:
on
1
Introduction
2
Agenda
3
Bluetooth Low Energy
4
Use Cases
5
Layers and Functions
6
Aruba
7
MM Compare
8
What can an attacker do
9
How would an attack look like
10
Access to multiple segments
11
Demonstration
12
Packet Structure
13
Length Field
14
TI Architecture
15
Advertising Packet
16
Data Entry Key
17
Data Received
18
Spray
19
Shellcode
20
Task at Hand
21
Preventing Future Overflows
22
Crushing the Chip
23
Restoring Execution
24
Backdoor
25
Backdoor Recap
26
Demo
27
Three takeaways
Description:
Explore BLEEDINGBIT, two zero-day vulnerabilities in Texas Instruments' BLE chips used in Cisco, Meraki, and Aruba wireless access points, in this Black Hat conference talk. Delve into Bluetooth Low Energy technology, its use cases, and layers. Understand the potential impact of these vulnerabilities, including how attackers can penetrate enterprise networks over the air. Examine the packet structure, TI architecture, and the intricacies of the exploit. Witness demonstrations of the attack process, from initial exploitation to establishing a backdoor. Learn about mitigation strategies and gain three key takeaways to enhance network security against such threats.

BLEEDINGBIT - Your APs Belong to Us

Black Hat
Add to list
0:00 / 0:00