Overview
Syllabus
Introduction
Why are these attacks so severe
Discoverability
Software
Bluetooth
Packet fragmentation
L2CAP
Mutual Configuration
Mutual Configuration Example
Negotiation Process
Strategy
Mitigations
Kernel Configuration
Samsung Smart Watch
Damos Echo
Delimited RC
Configuration Parameters
PTR
Overflow ELA
Post Exploit
Exploit Recap
Solara
SmartWatch
Recap
Bluetooth Connection
Exploit Script
Botnet
Health Area
Gear
WiFi MAC Address
Vulnerabilities Fixed
Android Devices
Industrial Control Systems
Undocumented Communication
Solution
How to build an exploit
How to monitor mobile devices
Taught by
Black Hat