Главная
Study mode:
on
1
Introduction
2
Expectations
3
Bluetooth
4
Bluetooth Smart
5
Bluetooth Classic vs BLE
6
BLE has flaws
7
Fitness Tracker
8
BLE Stack
9
Service Characteristics
10
Profile
11
Service and Characteristics
12
Finding nearby Bluetooth devices
13
How it works
14
BLE Services
15
Authentication
16
Reverse Engineering
17
Notification Tool
18
Notifications
19
Forum
20
Formal
21
Format
22
Firmware Update
23
Format Operation
24
Section
25
Questions
Description:
Explore Bluetooth Low Energy (BLE) hacking techniques and security vulnerabilities in fitness trackers during this 30-minute conference talk. Delve into the world of BLE device security, learning how to gather information, discover devices, reverse engineer mobile applications, and execute attacks. Witness a live demonstration using smart BLE fitness trackers, uncovering methods to compromise their security, including the possibility of uploading malicious firmware over the air. Gain insights into BLE stack, services, characteristics, and profiles, as well as authentication processes and firmware update mechanisms. Understand the differences between Bluetooth Classic and BLE, and discover tools for finding nearby Bluetooth devices. Engage with topics such as notification systems, forums, and formal formats used in BLE communication.

Hacking BLE Fitness Trackers: Security Vulnerabilities and Attack Techniques

Linux Foundation
Add to list
0:00 / 0:00