What would a BLEEDINGBIT attack look like? black hat
14
BLE Discovery
15
BLE link layer
16
TI CC2640 Architecture
17
CC2640 Memory Corruption
18
Lets try and crash it
19
Packet Length: Main Core vs Radio Core black hat
20
Case Study
21
What is being overwritten?
22
Where will the overflow data come from? black hat
23
Inter-core communication
24
Overflow mechanics
25
Spray
26
Exploit strategy
27
Size limitation
28
Tasks at hand
29
Making our first success last forever black hat
30
Restoring execution - Take 1
31
Restoring execution - Take 2
32
Installing a backdoor
33
Shellcode
Description:
Explore BLEEDINGBIT, two zero-day vulnerabilities in Texas Instruments' BLE chips used in popular wireless access points, allowing unauthenticated over-the-air enterprise network penetration. Delve into Bluetooth Low Energy attack surfaces, OTA solutions, and BLE in Aruba Access Points. Examine OAD implementation, firmware extraction, and custom OAD analysis. Discover BLE link layer intricacies, TI CC2640 architecture, and memory corruption techniques. Investigate inter-core communication, overflow mechanics, and exploit strategies. Learn to overcome size limitations, restore execution, and install backdoors. Gain insights into shellcode development for successful network infiltration in this comprehensive Black Hat conference presentation.