Introduction to Bluetooth Low Energy Exploitation

Bluetooth, especially Bluetooth Low Energy (BLE), has become the ubiquitous backbone that modern devices use to interact with each other. From mobile, to IoT, to automotive, most smart devices now support Bluetooth connections. This enhanced connectivity expands the attack surface making this attack vector an increasingly necessary aspect of security testing.

The webinar will:

  • cover various phases of Bluetooth exploitation
  • dive into the communication between BLE devices and companion mobile applications, with an emphasis on sniffing connections, spoofing targets, and exploiting services
  • demonstrate the use of basic BLE security research tools
  • discuss common security issues and recommendations the for a security-focused implementation of BLE for connected products

| webinar air date: May 28, 2020 

 

 

Please learn more about IOActive security services by visiting IOActive.com, or send us a note at info@ioactive.com.
Also, be sure to follow us on social media!

©2020 IOActive Inc. All Rights Reserved.
 701 5th Ave, Suite 7250, Seattle, Washington 98104, USA