YoVDO

Bluetooth Smart - The Good, The Bad, The Ugly, and The Fix

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Wireshark Courses Security Vulnerabilities Courses

Course Description

Overview

Explore the intricacies of Bluetooth Smart technology in this Black Hat USA 2013 conference talk. Delve into the protocol's design, from the physical layer to the application layer, and understand its strengths in low-power device applications. Uncover the vulnerabilities in Bluetooth Smart's key exchange process through a live demonstration of sniffing and recovering encryption keys using open-source tools. Learn about the risks of passive eavesdropping and decryption of communications. Discover a backward-compatible solution implementing Elliptic Curve Diffie-Hellman for secure in-band key exchange. Gain insights into the protocol stack, hopping mechanisms, GATT services, and the Ubertooth block diagram. Examine the PHY and Link layers, explore Wireshark capabilities, and understand custom key exchange protocols. Discuss the importance of Secure Simple Pairing in Bluetooth Smart and its backward compatibility. Witness a practical demonstration and summary of the technology's capabilities, accompanied by an overview of relevant software tools.

Syllabus

Intro
Why Bluetooth Smart? (2)
What is Bluetooth Smart?
Protocol Stack
Hopping
Example GATT Service: Heart Rate
Ubertooth Block Diagram
PHY Layer.. Link Layer..
Wireshark Awesomeness
Custom key Exchange Protocol
LTK Reuse
The Ugly: Recap
My Qualifications
Why Secure Simple Pairing?
SSP in Bluetooth Smart
Backward Compatibility
Demo
Summary
Capabilities
Software
Happy Birthday


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube