BLEEDINGBIT - Your APs Belong to Us
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
Agenda
Why Bluetooth Low Energy?
Why do APs support BLE?
BLE Attack surface
OTA solutions over BLE
BLE in Aruba Access Points
OAD in General
OAD in Aruba Access Points
Extracting BLE firmware
Analyzing custom OAD
OTA OAD OMG
What would a BLEEDINGBIT attack look like? black hat
BLE Discovery
BLE link layer
TI CC2640 Architecture
CC2640 Memory Corruption
Lets try and crash it
Packet Length: Main Core vs Radio Core black hat
Case Study
What is being overwritten?
Where will the overflow data come from? black hat
Inter-core communication
Overflow mechanics
Spray
Exploit strategy
Size limitation
Tasks at hand
Making our first success last forever black hat
Restoring execution - Take 1
Restoring execution - Take 2
Installing a backdoor
Shellcode
Taught by
Black Hat
Related Courses
Binder - The Bridge To Root - Hongli Han and Mingjian ZhouHack In The Box Security Conference via YouTube JARVIS Never Saw It Coming - Hacking Machine Learning in Speech, Text and Face Recognition
44CON Information Security Conference via YouTube SyScan360'16 Singapore - Memory Corruption Is For Wussies
SyScan360 via YouTube Select Code Execution From Using SQLite
media.ccc.de via YouTube Ghost in the Machine: Challenges in Embedded Binary Security - Enigma 2017
USENIX Enigma Conference via YouTube