YoVDO

Stealthily Access Your Android Phones - Bypass the Bluetooth Authentication

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Ethical Hacking Courses Android Security Courses Bluetooth Security Courses

Course Description

Overview

Explore a critical 0day vulnerability in Android's Bluetooth implementation called BlueRepli (Bluetooth Replicant) in this 41-minute Black Hat conference talk. Delve into the security risks present in the Android Open Source Project (AOSP) and oversights by major mobile phone manufacturers. Learn about Bluetooth's widespread use in Android devices and previous security issues like BlueBorne, KNOB, and BadBluetooth. Discover how BlueRepli can bypass Bluetooth authentication, potentially affecting millions of Android devices. Examine the technical aspects of this vulnerability, including hardware and software implications, UI manipulations, and root cache exploits. Gain insights into Bluetooth profiles, capabilities disguising techniques, and methods to bypass security dialogues. Understand the potential impact on user privacy and data security in Android phones.

Syllabus

Intro
Shortterm Privacy Chaos
Phonebook Short Messages
Bluetooth Profile
The Bad Bluetooth
What can Bluetooth do
How to disguise Bluetooth capabilities
How to bypass the second dialogue
The two bypass methods are mutually exclusive
The devices using the Android system reached 100 million in March this year
Blue Raptor is a wonderful discovery
Hardware
Software
UI
Root Cache
Summary


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube