Главная
Study mode:
on
1
Intro
2
Why Bluetooth Smart? (2)
3
What is Bluetooth Smart?
4
Protocol Stack
5
Hopping
6
Example GATT Service: Heart Rate
7
Ubertooth Block Diagram
8
PHY Layer.. Link Layer..
9
Wireshark Awesomeness
10
Custom key Exchange Protocol
11
LTK Reuse
12
The Ugly: Recap
13
My Qualifications
14
Why Secure Simple Pairing?
15
SSP in Bluetooth Smart
16
Backward Compatibility
17
Demo
18
Summary
19
Capabilities
20
Software
21
Happy Birthday
Description:
Explore the intricacies of Bluetooth Smart technology in this Black Hat USA 2013 conference talk. Delve into the protocol's design, from the physical layer to the application layer, and understand its strengths in low-power device applications. Uncover the vulnerabilities in Bluetooth Smart's key exchange process through a live demonstration of sniffing and recovering encryption keys using open-source tools. Learn about the risks of passive eavesdropping and decryption of communications. Discover a backward-compatible solution implementing Elliptic Curve Diffie-Hellman for secure in-band key exchange. Gain insights into the protocol stack, hopping mechanisms, GATT services, and the Ubertooth block diagram. Examine the PHY and Link layers, explore Wireshark capabilities, and understand custom key exchange protocols. Discuss the importance of Secure Simple Pairing in Bluetooth Smart and its backward compatibility. Witness a practical demonstration and summary of the technology's capabilities, accompanied by an overview of relevant software tools. Read more

Bluetooth Smart - The Good, The Bad, The Ugly, and The Fix

Black Hat
Add to list