Bluetooth - Does It Spark Joy?
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the intricacies of Bluetooth firmware reverse engineering in this 55-minute conference talk. Delve into the security implications of dissecting firmware, gain insights into the platform overview, and learn about Internal Blue. Discover techniques for reverse engineering with and without symbols, and understand the Broadcom Diagnostics Protocol. Examine the Fixed-coordinate Invalid Curve Attack and test mode execution. Gain knowledge about bug-finding toolchains and their applications in Bluetooth security analysis.
Syllabus
Bluetooth, does it spark joy?
Reverse engineering Bluetooth firmware - why?! . Dissecting firmware glves interesting insights on a security perspective
Platform Overview
Internal Blue
Reversing ...
Reverse engineering without symbols
Reverse engineering with symbols
Broadcom Diagnostics Protocol
Fixed-coordinate Invalid Curve Attack
Test mode execution
Bug finding toolchain
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube