Hacking BLE Fitness Trackers: Security Vulnerabilities and Attack Techniques
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore Bluetooth Low Energy (BLE) hacking techniques and security vulnerabilities in fitness trackers during this 30-minute conference talk. Delve into the world of BLE device security, learning how to gather information, discover devices, reverse engineer mobile applications, and execute attacks. Witness a live demonstration using smart BLE fitness trackers, uncovering methods to compromise their security, including the possibility of uploading malicious firmware over the air. Gain insights into BLE stack, services, characteristics, and profiles, as well as authentication processes and firmware update mechanisms. Understand the differences between Bluetooth Classic and BLE, and discover tools for finding nearby Bluetooth devices. Engage with topics such as notification systems, forums, and formal formats used in BLE communication.
Syllabus
Introduction
Expectations
Bluetooth
Bluetooth Smart
Bluetooth Classic vs BLE
BLE has flaws
Fitness Tracker
BLE Stack
Service Characteristics
Profile
Service and Characteristics
Finding nearby Bluetooth devices
How it works
BLE Services
Authentication
Reverse Engineering
Notification Tool
Notifications
Forum
Formal
Format
Firmware Update
Format Operation
Section
Questions
Taught by
Linux Foundation
Tags
Related Courses
Blockchain Scalability and its Foundations in Distributed SystemsThe University of Sydney via Coursera Don's Introduction to Ethical Hacking for Beginners
Udemy Hacking und Netzwerkanalyse mit Wireshark - Der Komplettkurs
Udemy Penetration Testing of Identity, Authentication and Authorization Mechanism
Pluralsight ASP.NET MVC 5 Identity: Authentication and Authorization
LinkedIn Learning