Explore the NSA Playset Bluetooth Smart Attack Tools in this 45-minute conference talk from Defcon Wireless Village 2014. Dive into the capabilities of Ubertooth, Crackle, and Bluez, and examine existing and implied Bluetooth capabilities. Learn about HID encryption, device lifecycle, and various attack techniques including sniffing pairing, OS exploitation, and unpairing. Discover the ingredients needed for Bluetooth attacks, such as HCl and HCI_USER_SOCKET, and how to use Scapy for putting it all together. Gain insights into the ANT Catalog's Bluetooth capabilities and explore potential targets like keyboards and mice.
The NSA Playset - Bluetooth Smart Attack Tools - Defcon Wireless Village 2014