Bluetooth Smart - The Good, The Bad, The Ugly, and The Fix
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the intricacies of Bluetooth Smart technology in this Black Hat USA 2013 conference talk. Delve into the protocol's design, from the physical layer to the application layer, and understand its strengths in low-power device applications. Uncover the vulnerabilities in Bluetooth Smart's key exchange process through a live demonstration of sniffing and recovering encryption keys using open-source tools. Learn about the risks of passive eavesdropping and decryption of communications. Discover a backward-compatible solution implementing Elliptic Curve Diffie-Hellman for secure in-band key exchange. Gain insights into the protocol stack, hopping mechanisms, GATT services, and the Ubertooth block diagram. Examine the PHY and Link layers, explore Wireshark capabilities, and understand custom key exchange protocols. Discuss the importance of Secure Simple Pairing in Bluetooth Smart and its backward compatibility. Witness a practical demonstration and summary of the technology's capabilities, accompanied by an overview of relevant software tools.
Syllabus
Intro
Why Bluetooth Smart? (2)
What is Bluetooth Smart?
Protocol Stack
Hopping
Example GATT Service: Heart Rate
Ubertooth Block Diagram
PHY Layer.. Link Layer..
Wireshark Awesomeness
Custom key Exchange Protocol
LTK Reuse
The Ugly: Recap
My Qualifications
Why Secure Simple Pairing?
SSP in Bluetooth Smart
Backward Compatibility
Demo
Summary
Capabilities
Software
Happy Birthday
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube