Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hacking BLE Fitness Trackers: Security Vulnerabilities and Attack Techniques
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Expectations
- 3 Bluetooth
- 4 Bluetooth Smart
- 5 Bluetooth Classic vs BLE
- 6 BLE has flaws
- 7 Fitness Tracker
- 8 BLE Stack
- 9 Service Characteristics
- 10 Profile
- 11 Service and Characteristics
- 12 Finding nearby Bluetooth devices
- 13 How it works
- 14 BLE Services
- 15 Authentication
- 16 Reverse Engineering
- 17 Notification Tool
- 18 Notifications
- 19 Forum
- 20 Formal
- 21 Format
- 22 Firmware Update
- 23 Format Operation
- 24 Section
- 25 Questions