YoVDO

BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux - IoT Device

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Linux Courses Exploit Development Courses Bluetooth Security Courses

Course Description

Overview

Explore a groundbreaking presentation on BlueBorne, a new class of airborne attacks that can remotely compromise Linux and IoT devices. Delve into the implications of these attacks that bypass current security measures, enabling hackers to execute contagious attacks capable of jumping over "air-gapped" networks. Witness demonstrations of two zero-day exploits found in Bluetooth stacks of major operating systems. Learn how easily devices from PCs to IoT can be infected without user interaction, requiring only active Bluetooth. Gain insights into attack severity, discoverability, software vulnerabilities, and mitigation strategies. Examine specific case studies involving Samsung Smart Watches, Android devices, and industrial control systems. Understand the technical aspects of exploit building, mobile device monitoring, and potential solutions to this critical security threat.

Syllabus

Introduction
Why are these attacks so severe
Discoverability
Software
Bluetooth
Packet fragmentation
L2CAP
Mutual Configuration
Mutual Configuration Example
Negotiation Process
Strategy
Mitigations
Kernel Configuration
Samsung Smart Watch
Damos Echo
Delimited RC
Configuration Parameters
PTR
Overflow ELA
Post Exploit
Exploit Recap
Solara
SmartWatch
Recap
Bluetooth Connection
Exploit Script
Botnet
Health Area
Gear
WiFi MAC Address
Vulnerabilities Fixed
Android Devices
Industrial Control Systems
Undocumented Communication
Solution
How to build an exploit
How to monitor mobile devices


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube