Hey Everyone,
Still waiting to hear if my topic will be selected this year at defcon (cross my fingers) but I wanted to see what others within the DeFCon forums thought and what they have heard or experienced with regard to bluetooth (in)security.
OverView:
With over 1 million Bluetooth-enabled devices shipping a week, Bluetooth has become widely adopted and accepted by consumers as well as touted as an industry standard by manufacturers. With countless implementations and uses for this protocol, the industry continues to press on with production, however naieve of the inherent vulnerabilities within the bluetooth stack itself. This presentation will take an in depth look into the origins of the bluetooth protocol and its evolution since its conception, including a technical overview of the protocol itself and possible vulnerabilities. It will finally include the release of a new Bluetooth Scanning Tool which will encompass real world examples and Proof-of-Concept demonstrations as well as pose questions designed to provoke thought and suggest new implementations of this growing technology.
We will be relasing a bluetooth scanning tool made to run natively under any linux environment with BlueZ (bluetooth kernal module) installed. It will go beyond the existing information gathering bluetooth scanners and will be focused on identifying vulnerable cellular handsets and quickly exploiting them with the appropriate attack (RFCOMM, OBEX, etc.). There will be a graphical and a command line interface as well as periodic updates to the vulnerability database as new firmware is released by device manufacturers. This tool is a proof-of-concept utility designed to show how easily it is to grab vast amounts of information from a handset and even utilize data and voice services through a bluetooth link.
Look forward to hearing from you all!
Still waiting to hear if my topic will be selected this year at defcon (cross my fingers) but I wanted to see what others within the DeFCon forums thought and what they have heard or experienced with regard to bluetooth (in)security.
OverView:
With over 1 million Bluetooth-enabled devices shipping a week, Bluetooth has become widely adopted and accepted by consumers as well as touted as an industry standard by manufacturers. With countless implementations and uses for this protocol, the industry continues to press on with production, however naieve of the inherent vulnerabilities within the bluetooth stack itself. This presentation will take an in depth look into the origins of the bluetooth protocol and its evolution since its conception, including a technical overview of the protocol itself and possible vulnerabilities. It will finally include the release of a new Bluetooth Scanning Tool which will encompass real world examples and Proof-of-Concept demonstrations as well as pose questions designed to provoke thought and suggest new implementations of this growing technology.
We will be relasing a bluetooth scanning tool made to run natively under any linux environment with BlueZ (bluetooth kernal module) installed. It will go beyond the existing information gathering bluetooth scanners and will be focused on identifying vulnerable cellular handsets and quickly exploiting them with the appropriate attack (RFCOMM, OBEX, etc.). There will be a graphical and a command line interface as well as periodic updates to the vulnerability database as new firmware is released by device manufacturers. This tool is a proof-of-concept utility designed to show how easily it is to grab vast amounts of information from a handset and even utilize data and voice services through a bluetooth link.
Look forward to hearing from you all!
Comment