Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

BLEEDINGBIT - Your APs Belong to Us

Black Hat via YouTube

Overview

Explore BLEEDINGBIT, two zero-day vulnerabilities in Texas Instruments' BLE chips used in Cisco, Meraki, and Aruba wireless access points, in this Black Hat conference talk. Delve into Bluetooth Low Energy technology, its use cases, and layers. Understand the potential impact of these vulnerabilities, including how attackers can penetrate enterprise networks over the air. Examine the packet structure, TI architecture, and the intricacies of the exploit. Witness demonstrations of the attack process, from initial exploitation to establishing a backdoor. Learn about mitigation strategies and gain three key takeaways to enhance network security against such threats.

Syllabus

Introduction
Agenda
Bluetooth Low Energy
Use Cases
Layers and Functions
Aruba
MM Compare
What can an attacker do
How would an attack look like
Access to multiple segments
Demonstration
Packet Structure
Length Field
TI Architecture
Advertising Packet
Data Entry Key
Data Received
Spray
Shellcode
Task at Hand
Preventing Future Overflows
Crushing the Chip
Restoring Execution
Backdoor
Backdoor Recap
Demo
Three takeaways

Taught by

Black Hat

Reviews

Start your review of BLEEDINGBIT - Your APs Belong to Us

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.