Title: The Basics Of Breaking BLE v3

Evolving over the past twenty-two years, Bluetooth, especially Bluetooth Low Energy (BLE), has become the ubiquitous backbone modern devices use to perform low energy communications. From mobile, to IoT, to Auto, most smart devices now support Bluetooth connections, meaning that the attack vector is becoming an increasingly important aspect of security testing. This talk will breakdown the various phases of testing Bluetooth devices with an emphasis on sniffing BLE connections, spoofing devices, and exploiting GATT services. We will cover key components of the Bluetooth protocol stack, and the tools required to start testing BLE in your home, or as part of a Bluetooth pentest. This talk will also demonstrate that all you need to start testing BLE is an Android or iOS device, and a bit of curiosity.

This talk is available on YouTube.


Talk: https://www.youtube.com/watch?v=7giQCeNBJek

Speaker(s): FreqyXin

Location: Wireless Vlg

Discord: https://discord.com/channels/7082082...32595493666826

Event starts: 2020-08-06 09:00 (09:00 AM) PDT (UTC -07:00)

Event ends: 2020-08-06 09:01 (09:01 AM) PDT (UTC -07:00)

For the most up-to-date information, please either visit https://info.defcon.org, or use HackerTracker, which is available for iOS and Android. This is an automated message, and this data was last modified 2020-08-06T19:27 (UTC).