Shmoocon 2013: Sniffing Bluetooth low energy

in RF, security, Videos by the machinegeek | 5 comments


In this presentation from the recent Shmoocon 2013 conference in Washington, DC, Mike Ryan from iSec Partners discusses the new generation of wireless hacking tools to intercept and inject Bluetooth Low Energy (BTLE) communications. Also known as Bluetooth Smart, BTLE was defined in the BT 4.0 spec and will be appearing in a growing number of sports sensors, medical devices, etc.

This talk covers both the Bluetooth LE protocol and the tools and techniques used to study it, as well as live demos of sniffing BTLE using Ubertooth and other hardware.

For links to slides of this and other Bluetooth related presentations visit Mike Ryan’s webpage.

This entry was posted in RF, security, Videos and tagged , , .

Comments

  1. wam says:

    PC’s suck at RF?

    What?

    Uh… whoa. Apples to oranges. PC’s and mac’s suck anyway.

    For most applications (usually about as complicated as a coin acceptor on a soda machine) using a PC is like having me and a bunch of my old fart friends do porn. Just imagine the overhead in Viagra, EMT’s, defibrillators (maybe even defibrillator toasters – Google it), scene retakes, etc… instead of just getting some young, dumb, full of.. 20 yo’s.

    Having to load a crap load of OS, kernel drivers is just silly.

  2. “sniffing BTLE is hard”? Um….TI gives out for CC2540-based USB dongles and their site gives out firmware for them to sniff BTLE easily. If this is “hard” I am afraid to ask what easy is…

Leave a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Notify me of followup comments via e-mail. You can also subscribe without commenting.