Reversing and Exploiting Broadcom Bluetooth
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore the intricacies of Bluetooth firmware analysis and exploitation in this conference talk from Recon 2019. Dive into the world of InternalBlue, a powerful framework for analyzing and patching Broadcom Bluetooth chips. Gain insights into the challenges of reverse engineering complex firmware with thousands of undefined functions, and learn how to port features across different firmware versions. Discover practical examples of writing custom patches using both assembly and C, leveraging the Nexmon project for extended functionality. Examine two critical vulnerabilities, CVE-2018-19860 and CVE-2019-6994, uncovered during the research process. Understand the practical implications and difficulties of patching Bluetooth firmware in real-world scenarios, making this talk invaluable for security researchers and Bluetooth enthusiasts alike.
Syllabus
Recon 2019 - Reversing and Exploiting Broadcom Bluetooth by Jiska & Dennis Mantz
Taught by
Recon Conference
Related Courses
Stealthily Access Your Android Phones - Bypass the Bluetooth AuthenticationBlack Hat via YouTube For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
44CON Information Security Conference via YouTube IoT and the Security of That Mobile App - Mark Loveless
LASCON via YouTube Fuzzing the Phone in the iPhone
media.ccc.de via YouTube BrokenMesh - New Attack Surfaces of Bluetooth Mesh
Black Hat via YouTube