YoVDO

BrokenMesh - New Attack Surfaces of Bluetooth Mesh

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Bluetooth Security Courses

Course Description

Overview

Explore the vulnerabilities and attack surfaces of Bluetooth Mesh in this 37-minute Black Hat conference talk. Gain insights into the background of Bluetooth Mesh, analyze network build and control protocols, and discover potential security weaknesses in their implementation and wrapper applications. Learn about the innovative BLE Mesh Fuzzer design and examine real-world vulnerability cases. Conclude with valuable safety recommendations to enhance Bluetooth Mesh security.

Syllabus

BrokenMesh: New Attack Surfaces of Bluetooth Mesh


Taught by

Black Hat

Related Courses

Stealthily Access Your Android Phones - Bypass the Bluetooth Authentication
Black Hat via YouTube
For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
44CON Information Security Conference via YouTube
IoT and the Security of That Mobile App - Mark Loveless
LASCON via YouTube
Fuzzing the Phone in the iPhone
media.ccc.de via YouTube
BlueMaster - Bypassing and Fixing Bluetooth-Based Proximity Authentication
Black Hat via YouTube