DEF CON Forum Site Header Art

Announcement

Collapse
No announcement yet.

Learning to Hack Bluetooth Low Energy with BLE CTF by Ryan Holeman at DEF CON 29

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Learning to Hack Bluetooth Low Energy with BLE CTF by Ryan Holeman at DEF CON 29

    Learning to Hack Bluetooth Low Energy with BLE CTF
    Ryan Holeman

    To prepare for the workshop, please follow the setup documentation located at https://github.com/hackgnar/ble_ctf/...kshop_setup.md

    ABSTRACT
    Summarize what your training will cover, attendees will read this to get an idea of what they should know before training, and what they will learn after. Use this to section to broadly describe how technical your class is, what tools will be used, and what materials to read in advance to get the most out of your training. This abstract is the primary way people will be drawn to your session.

    BLE CTF is a series of Bluetooth low energy challenges in a capture the flag format. It was created to teach the fundamentals of interacting with and hacking Bluetooth Low Energy services. Each exercise, or flag, aims to interactively teach a new concept to the user. For this workshop, we will step through a series of exercises to teach beginner students new concepts and allow more seasoned users to try new tools and techniques. After completing this workshop, you should have a good solid understanding of how to interact with and hack on BLE devices in the wild.

    If you have done BLE CTF in the past, this class is still valuable. For advanced users we offer BLE CTF Infinity which is a sequel to BLE CTF. BLE CTF Infinity offers new exercises where each flag challenge is hosted in a completely separate GATT service. The new version allows for more advanced challenges which were not possible in the past.

    To prepare for the workshop, please follow the setup documentation located at https://github.com/hackgnar/ble_ctf/...kshop_setup.md

    Materials or Equipment students will need to bring to participate?:
    Preferably a Linux box with a bluetooth controller or a bluetooth usb dongle. An OSX or Windows machine with a Linux VM and usb passthough works as well but should be setup and tested before the workshop.

    What level of skill is required for your targeted audience (Beginner/Intermediate/Advanced)?:
    This workshop targets all skill levels. A beginner with basic Linux cli experience can participate. Intermediate and advanced users will learn things from all exercises as well. If there is a larger group of intermediate or advanced users that attend, I can easily run the class in 2 groups that focus on exercises of different difficulty.

    TRAINER BIO(S)
    Ryan Holeman resides in Austin Texas where he works as the Global Security Overlord on Atlassian's Security team. He is also an advisor for the endpoint security software company Ziften Technologies. He received a Masters of Science in Software Engineering from Kent State University. His graduate research and masters thesis focused on C++ template metaprograming. He has spoken at many respected venues such as Black Hat, DEF CON, Lockdown, BSides, Ruxcon, Notacon, and Shmoocon. He has also published papers though venues such as ICSM and ICPC . You can keep up with his current activity, open source contributions and general news on his blog. His spare time is mostly spent digging into various network protocols, random hacking, creating art, and shredding local skateparks.
    Last edited by Dark Tangent; 6 days ago. Reason: Removed outline, it might change before the workshop
    PGP key: dtangent@defcon.org valid 2020 Jan 15, to 2024 Jan 01 Fingerprint: BC5B CD9A C609 1B6B CD81 9636 D7C6 E96C FE66 156A

  • #2
    Hello just checking for more info on what day, what time and how to sign up. Thanks!

    Comment


    • #3
      Originally posted by v3ga View Post
      Hello just checking for more info on what day, what time and how to sign up. Thanks!
      I second this motion. Please release the date/time group for the evolution.

      Comment

      Working...
      X