Completed
How would an attack look like
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
BLEEDINGBIT - Your APs Belong to Us
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Bluetooth Low Energy
- 4 Use Cases
- 5 Layers and Functions
- 6 Aruba
- 7 MM Compare
- 8 What can an attacker do
- 9 How would an attack look like
- 10 Access to multiple segments
- 11 Demonstration
- 12 Packet Structure
- 13 Length Field
- 14 TI Architecture
- 15 Advertising Packet
- 16 Data Entry Key
- 17 Data Received
- 18 Spray
- 19 Shellcode
- 20 Task at Hand
- 21 Preventing Future Overflows
- 22 Crushing the Chip
- 23 Restoring Execution
- 24 Backdoor
- 25 Backdoor Recap
- 26 Demo
- 27 Three takeaways