Introduction to Bluetooth Low Energy Exploitation
Bluetooth, especially Bluetooth Low Energy (BLE), has become the ubiquitous backbone that modern devices use to interact with each other. From mobile, to IoT, to automotive, most smart devices now support Bluetooth connections. This enhanced connectivity expands the attack surface making this attack vector an increasingly necessary aspect of security testing.
The webinar will:
- cover various phases of Bluetooth exploitation
- dive into the communication between BLE devices and companion mobile applications, with an emphasis on sniffing connections, spoofing targets, and exploiting services
- demonstrate the use of basic BLE security research tools
- discuss common security issues and recommendations the for a security-focused implementation of BLE for connected products
| webinar air date: May 28, 2020