BLE Exploitation: Story of “SMART” devices

Tech1 (718A) October 9, 2019 - Feedback     

Bookmark and Share

Yogesh Ojha

Bluetooth Low Energy (BLE) is being used extensively in almost all the modern “Smart” devices, from smartphones and smartwatches to advanced medical equipment. This talk will introduce several new BLE hacking techniques and tools as well as techniques for performing attacks on “SMART” BLE Devices.

The talk will focus on gathering enough information about BLE devices from the security standpoint, discovering them, reverse engineering the mobile application and attacking them.

We will be using “SMART” BLE Fitness Trackers and Locks and will reverse engineer their mobile applications and gather enough information to attack them. We will also see how uploading the malicious firmware over the air is also possible.

This talk is for those who are excited about BLE Exploitation. You’ll learn about the advancements in BLE, open source hardware/software tools available to exploit them and, if you are a hardware manufacturer who uses BLE on production, you will get to learn about do’s and don’ts in BLE.