Overview
Explore Bluetooth Low Energy (BLE) hacking techniques and security vulnerabilities in fitness trackers during this 30-minute conference talk. Delve into the world of BLE device security, learning how to gather information, discover devices, reverse engineer mobile applications, and execute attacks. Witness a live demonstration using smart BLE fitness trackers, uncovering methods to compromise their security, including the possibility of uploading malicious firmware over the air. Gain insights into BLE stack, services, characteristics, and profiles, as well as authentication processes and firmware update mechanisms. Understand the differences between Bluetooth Classic and BLE, and discover tools for finding nearby Bluetooth devices. Engage with topics such as notification systems, forums, and formal formats used in BLE communication.
Syllabus
Introduction
Expectations
Bluetooth
Bluetooth Smart
Bluetooth Classic vs BLE
BLE has flaws
Fitness Tracker
BLE Stack
Service Characteristics
Profile
Service and Characteristics
Finding nearby Bluetooth devices
How it works
BLE Services
Authentication
Reverse Engineering
Notification Tool
Notifications
Forum
Formal
Format
Firmware Update
Format Operation
Section
Questions
Taught by
Linux Foundation