Главная
Study mode:
on
1
Intro
2
NSA Playset: Bluetooth Smart
3
Standard Note
4
The NSA Playset
5
Capabilities: Ubertooth
6
Capabilities: Crackle
7
Capabilities: Bluez
8
Existing Capabilities
9
ANT Catalog: Bluetooth
10
Implied Bluetooth Capbilities
11
Keyboards and Mice
12
Do BLE Keyboards Exist?
13
Targets
14
HID Encryption
15
HID Device Lifecycle
16
Attack Techniques
17
Sniff Pairing
18
OS Exploitation
19
Unpairing
20
TINYALAMO
21
Naming Names
22
Ingredients
23
HCl and HCI_USER_SOCKET
24
Scapy
25
Putting it all together
26
URL ME BRO
27
Thank You
Description:
Explore the NSA Playset Bluetooth Smart Attack Tools in this 45-minute conference talk from Defcon Wireless Village 2014. Dive into the capabilities of Ubertooth, Crackle, and Bluez, and examine existing and implied Bluetooth capabilities. Learn about HID encryption, device lifecycle, and various attack techniques including sniffing pairing, OS exploitation, and unpairing. Discover the ingredients needed for Bluetooth attacks, such as HCl and HCI_USER_SOCKET, and how to use Scapy for putting it all together. Gain insights into the ANT Catalog's Bluetooth capabilities and explore potential targets like keyboards and mice.

The NSA Playset - Bluetooth Smart Attack Tools - Defcon Wireless Village 2014

Add to list
0:00 / 0:00