Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming

Cooper via YouTube

Overview

Explore the vulnerabilities of Bluetooth Low Energy 5 technology in this insightful conference talk. Delve into the intricacies of the Pseudo-Random Number Generator (PRNG) used in BLE 5 and learn how it can be exploited for various purposes, including jamming. Gain valuable knowledge about the security implications of this widely-used wireless protocol and understand the potential risks associated with its implementation. Discover practical techniques and methodologies for analyzing and potentially compromising BLE 5 systems, equipping yourself with essential information for both offensive and defensive cybersecurity practices.

Syllabus

Defeating Bluetooth Low Energy 5 PRNG For Fun And Jamming - Damien Cauquil

Taught by

Cooper

Reviews

Start your review of Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.