Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Bluetooth Reverse Engineering - Tools and Techniques

RSA Conference via YouTube

Overview

Explore Bluetooth reverse engineering tools and techniques in this 52-minute RSA Conference talk. Gain insights into the growing IoT landscape and learn how to analyze Bluetooth-enabled devices using readily available hardware. Discover the structure of Bluetooth communications, utilize Linux and OS X logging tools, and follow practical reverse engineering processes. Examine case studies on various Bluetooth devices, including blood pressure monitors, padlocks, headsets, credit cards, and electric skateboards. Understand common security problems in Bluetooth implementations and enhance your skills in assessing IoT device vulnerabilities, whether you're a beginner or an experienced professional in the field.

Syllabus

RSAConference 2019 San Francisco March 4-8 Moscone Center
Structure of the Talk
Ubertooth One
Bluetooth Overview
Linux Logging
OS X packet logger
Reverse Engineering Process
BLE Blood Pressure Monitor
Conclusions: BP Monitor
BLE Padlock
Conclusions: Padlock
Classic Bluetooth Headset
Audacity
Conclusions: Headset
BLE Credit Card
What is a Bluetooth credit card?
Conclusions: Credit Card
BLE Electric Skateboard
Conclusions: Skateboard
Most Common Security Problems

Taught by

RSA Conference

Reviews

Start your review of Bluetooth Reverse Engineering - Tools and Techniques

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.