Dark Mentor LLC
Dark Mentor LLC
Home
Training
Publications
Blog
Bluetooth Security Timeline
PC/Server Firmware Security Timeline
LL
Bluetooth reconnaissance with Blue2thprinting
1 day class covering how to use the
Blue2thprinting
software to perform reconnaissance on devices, and understand vulnerabilities they may have.
Xeno Kovah
Bluetooth Low Energy - Full Stack Attack
4 day class covering the full Bluetooth Low Energy (BLE) protocol stack from the bottom (PHY) up to the top (GATT). The core of the class is built around playing with a game application on an Android phone, talking via Bluetooth to an IoT-type piece of hardware, and analyzing the communication between them. The 4th day is focused on assessing a cutomized Ultra-Vulnerable Peripheral firmware, running on Zephyr RTOS, which has had vulnerabilities introduced into it which are representative of vulnerabilities found in the past across many other platforms.
Veronica Kovah
,
Xeno Kovah
Cite
×