Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Bluetooth Smart technology in this Black Hat USA 2013 conference talk. Delve into the protocol's design, from the physical layer to the application layer, and understand its strengths in low-power device applications. Uncover the vulnerabilities in Bluetooth Smart's key exchange process through a live demonstration of sniffing and recovering encryption keys using open-source tools. Learn about the risks of passive eavesdropping and decryption of communications. Discover a backward-compatible solution implementing Elliptic Curve Diffie-Hellman for secure in-band key exchange. Gain insights into the protocol stack, hopping mechanisms, GATT services, and the Ubertooth block diagram. Examine the PHY and Link layers, explore Wireshark capabilities, and understand custom key exchange protocols. Discuss the importance of Secure Simple Pairing in Bluetooth Smart and its backward compatibility. Witness a practical demonstration and summary of the technology's capabilities, accompanied by an overview of relevant software tools.
Syllabus
Intro
Why Bluetooth Smart? (2)
What is Bluetooth Smart?
Protocol Stack
Hopping
Example GATT Service: Heart Rate
Ubertooth Block Diagram
PHY Layer.. Link Layer..
Wireshark Awesomeness
Custom key Exchange Protocol
LTK Reuse
The Ugly: Recap
My Qualifications
Why Secure Simple Pairing?
SSP in Bluetooth Smart
Backward Compatibility
Demo
Summary
Capabilities
Software
Happy Birthday
Taught by
Black Hat