YoVDO

Bluetooth Reverse Engineering - Tools and Techniques

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Audacity Courses

Course Description

Overview

Explore Bluetooth reverse engineering tools and techniques in this 52-minute RSA Conference talk. Gain insights into the growing IoT landscape and learn how to analyze Bluetooth-enabled devices using readily available hardware. Discover the structure of Bluetooth communications, utilize Linux and OS X logging tools, and follow practical reverse engineering processes. Examine case studies on various Bluetooth devices, including blood pressure monitors, padlocks, headsets, credit cards, and electric skateboards. Understand common security problems in Bluetooth implementations and enhance your skills in assessing IoT device vulnerabilities, whether you're a beginner or an experienced professional in the field.

Syllabus

RSAConference 2019 San Francisco March 4-8 Moscone Center
Structure of the Talk
Ubertooth One
Bluetooth Overview
Linux Logging
OS X packet logger
Reverse Engineering Process
BLE Blood Pressure Monitor
Conclusions: BP Monitor
BLE Padlock
Conclusions: Padlock
Classic Bluetooth Headset
Audacity
Conclusions: Headset
BLE Credit Card
What is a Bluetooth credit card?
Conclusions: Credit Card
BLE Electric Skateboard
Conclusions: Skateboard
Most Common Security Problems


Taught by

RSA Conference

Related Courses

Introduction to Computational Arts: Audio
State University of New York via Coursera
Introduction to Sound and Acoustic Sketching
University St. Joseph via Kadenze
Radio para internet con Podcast: creación y conceptos básicos
Universitat Politècnica de València via edX
Música para el siglo XXI. Aportaciones del software libre a la educación musical
Universidade da Coruña via Miríadax
Audacity Professional Vocals for Courses Video & More Part 1
Udemy