YoVDO

Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Bluetooth Security Courses

Course Description

Overview

Explore the vulnerabilities in Bluetooth Low Energy version 5's new channel hopping algorithm in this 45-minute conference talk from BruCON Security Conference. Discover how the pseudo-random number generator (PRNG) introduced to improve collision avoidance can be exploited for sniffing and jamming communications between BLE 5 devices. Learn about the weaknesses in the PRNG and how it can be defeated, rendering previous sniffing tools effective once again. Gain insights into the release of an updated version of BtleJack, providing IoT hackers with an efficient method to sniff BLE 5 connections. Delve into the technical aspects of breaking the PRNG and understand the implications for security in Bluetooth Low Energy 5 devices.

Syllabus

10 - BruCON 0x0B - Defeating Bluetooth Low Energy 5 PRNG for fun and jamming - Damien Cauquil


Taught by

BruCON Security Conference

Related Courses

Stealthily Access Your Android Phones - Bypass the Bluetooth Authentication
Black Hat via YouTube
For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
44CON Information Security Conference via YouTube
IoT and the Security of That Mobile App - Mark Loveless
LASCON via YouTube
Fuzzing the Phone in the iPhone
media.ccc.de via YouTube
BrokenMesh - New Attack Surfaces of Bluetooth Mesh
Black Hat via YouTube