Completed
Kernel Configuration
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux - IoT Device
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Why are these attacks so severe
- 3 Discoverability
- 4 Software
- 5 Bluetooth
- 6 Packet fragmentation
- 7 L2CAP
- 8 Mutual Configuration
- 9 Mutual Configuration Example
- 10 Negotiation Process
- 11 Strategy
- 12 Mitigations
- 13 Kernel Configuration
- 14 Samsung Smart Watch
- 15 Damos Echo
- 16 Delimited RC
- 17 Configuration Parameters
- 18 PTR
- 19 Overflow ELA
- 20 Post Exploit
- 21 Exploit Recap
- 22 Solara
- 23 SmartWatch
- 24 Recap
- 25 Bluetooth Connection
- 26 Exploit Script
- 27 Botnet
- 28 Health Area
- 29 Gear
- 30 WiFi MAC Address
- 31 Vulnerabilities Fixed
- 32 Android Devices
- 33 Industrial Control Systems
- 34 Undocumented Communication
- 35 Solution
- 36 How to build an exploit
- 37 How to monitor mobile devices