Overview
Explore Bluetooth reverse engineering tools and techniques in this 52-minute RSA Conference talk. Gain insights into the growing IoT landscape and learn how to analyze Bluetooth-enabled devices using readily available hardware. Discover the structure of Bluetooth communications, utilize Linux and OS X logging tools, and follow practical reverse engineering processes. Examine case studies on various Bluetooth devices, including blood pressure monitors, padlocks, headsets, credit cards, and electric skateboards. Understand common security problems in Bluetooth implementations and enhance your skills in assessing IoT device vulnerabilities, whether you're a beginner or an experienced professional in the field.
Syllabus
RSAConference 2019 San Francisco March 4-8 Moscone Center
Structure of the Talk
Ubertooth One
Bluetooth Overview
Linux Logging
OS X packet logger
Reverse Engineering Process
BLE Blood Pressure Monitor
Conclusions: BP Monitor
BLE Padlock
Conclusions: Padlock
Classic Bluetooth Headset
Audacity
Conclusions: Headset
BLE Credit Card
What is a Bluetooth credit card?
Conclusions: Credit Card
BLE Electric Skateboard
Conclusions: Skateboard
Most Common Security Problems
Taught by
RSA Conference