Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Hacking BLE Fitness Trackers: Security Vulnerabilities and Attack Techniques

Linux Foundation via YouTube

Overview

Explore Bluetooth Low Energy (BLE) hacking techniques and security vulnerabilities in fitness trackers during this 30-minute conference talk. Delve into the world of BLE device security, learning how to gather information, discover devices, reverse engineer mobile applications, and execute attacks. Witness a live demonstration using smart BLE fitness trackers, uncovering methods to compromise their security, including the possibility of uploading malicious firmware over the air. Gain insights into BLE stack, services, characteristics, and profiles, as well as authentication processes and firmware update mechanisms. Understand the differences between Bluetooth Classic and BLE, and discover tools for finding nearby Bluetooth devices. Engage with topics such as notification systems, forums, and formal formats used in BLE communication.

Syllabus

Introduction
Expectations
Bluetooth
Bluetooth Smart
Bluetooth Classic vs BLE
BLE has flaws
Fitness Tracker
BLE Stack
Service Characteristics
Profile
Service and Characteristics
Finding nearby Bluetooth devices
How it works
BLE Services
Authentication
Reverse Engineering
Notification Tool
Notifications
Forum
Formal
Format
Firmware Update
Format Operation
Section
Questions

Taught by

Linux Foundation

Reviews

Start your review of Hacking BLE Fitness Trackers: Security Vulnerabilities and Attack Techniques

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.