BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux - IoT Device

BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux - IoT Device

Black Hat via YouTube Direct link

Introduction

1 of 37

1 of 37

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux - IoT Device

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Why are these attacks so severe
  3. 3 Discoverability
  4. 4 Software
  5. 5 Bluetooth
  6. 6 Packet fragmentation
  7. 7 L2CAP
  8. 8 Mutual Configuration
  9. 9 Mutual Configuration Example
  10. 10 Negotiation Process
  11. 11 Strategy
  12. 12 Mitigations
  13. 13 Kernel Configuration
  14. 14 Samsung Smart Watch
  15. 15 Damos Echo
  16. 16 Delimited RC
  17. 17 Configuration Parameters
  18. 18 PTR
  19. 19 Overflow ELA
  20. 20 Post Exploit
  21. 21 Exploit Recap
  22. 22 Solara
  23. 23 SmartWatch
  24. 24 Recap
  25. 25 Bluetooth Connection
  26. 26 Exploit Script
  27. 27 Botnet
  28. 28 Health Area
  29. 29 Gear
  30. 30 WiFi MAC Address
  31. 31 Vulnerabilities Fixed
  32. 32 Android Devices
  33. 33 Industrial Control Systems
  34. 34 Undocumented Communication
  35. 35 Solution
  36. 36 How to build an exploit
  37. 37 How to monitor mobile devices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.