Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting Bluetooth Vulnerabilities: From Vehicle Systems to Bank Account Access

DEFCONConference via YouTube

Overview

Learn about critical Bluetooth security vulnerabilities in modern vehicles and aircraft systems through this DEF CON 32 conference talk. Discover how infotainment systems' increased functionality and wireless connectivity create new attack surfaces, particularly due to patching challenges. Explore the BlueToolkit framework for testing and exploiting Bluetooth Classic vulnerabilities, including practical demonstrations and newly discovered exploits. Examine findings from research that uncovered 64 vulnerabilities across 22 modern cars and the Garmin Flight Stream flight management system. Gain insights into implementation-specific vulnerabilities that could enable information theft, man-in-the-middle attacks, and privilege escalation leading to account hijacking. Master techniques and methodologies that make Bluetooth security research more accessible and reproducible for security professionals and researchers.

Syllabus

DEF CON 32 - Exploiting Bluetooth from your car to the bank account$$ - Yso & Martin Strohmeier

Taught by

DEFCONConference

Reviews

Start your review of Exploiting Bluetooth Vulnerabilities: From Vehicle Systems to Bank Account Access

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.