Bluetooth Hacking: Tools And Techniques | Mike Ryan | hardwear.io USA 2019

  Рет қаралды 46,772

hardwear.io

hardwear.io

Күн бұрын

Talk Abstract:
This talk by Mike Ryan described how to reverse engineer Bluetooth data on a variety of devices including a heart monitor, a padlock, a music listening device, a Bluetooth credit card, and a Bluetooth-controlled skateboard. Although the techniques depended on physical access to the device (attacks that did not have this access would require a protocol sniffer), it was an exciting demonstration of how to extract Bluetooth data from the device before it goes out to the air. And that said, the threat model for some Bluetooth devices (such as that credit card) should assume that someone will be handling those devices out of your sight.
About Presenter:
Mike Ryan is a noted expert on Bluetooth security. He has discovered several Bluetooth-related CVEs: CVE-2018-9119 (stealing credit card numbers via Bluetooth), CVE-2014-4428 (affecting OS X, iOS, and Apple TV), and along with Richo Healey discovered CVE-2015-2249 (affecting Boosted electric skateboards). In 2016 Mike founded ICE9 Consulting to address the increasing demand for security reviews of IoT devices. Mike's personal motto is "if you like it, you shoulda put Bluetooth on it."
#BluetoothHacking #Security #IoT
------------------------------------------------------------------------------------
Website: hardwear.io
Follow hardwear.io on Twitter: / hardwear_io .
Follow hardwear.io on Facebook: / hardwear.io
-------------------------------------------------------------------------------------

Пікірлер: 36
@christopherpetrov2355
@christopherpetrov2355 2 жыл бұрын
Can use use Raspi bluetooth to sniff psockets??
@DELREYGUY
@DELREYGUY Жыл бұрын
I bought a Bluetooth FM transmitter direct from China and the language prompts are only available in Chinese. Can I hack the unit to speak English?
@abdullahnaina5225
@abdullahnaina5225 Ай бұрын
How does he decrypt the ble blood pressure monitor values? Is it encrypted? What encryption algorithm is this?
@midnitekisses9559
@midnitekisses9559 Жыл бұрын
How close do you have to be to the target device?
@punkpendulums
@punkpendulums 2 жыл бұрын
10:33 enable HCI snoop log
@mohammedal-shaboti7939
@mohammedal-shaboti7939 3 жыл бұрын
Great, but you didn't mention where to find this log file, I couldn't find it. seems it need to use ADB or something else.
@Diogo154677
@Diogo154677 3 жыл бұрын
source.android.com/devices/bluetooth/verifying_debugging#debugging-with-bug-reports
@katikati39
@katikati39 3 жыл бұрын
You should see how easy is doing all of that with BLE:Bit lol
@declanahern1736
@declanahern1736 2 жыл бұрын
Hi, I am trying to deveop a system that captures heart rate data and forwards to a smart bulb as a warning i.e red = bad. I am unable to see my polar h7 device data, I am using rasbian on a raspberry pi 3. How have set up wireshark to capture tha data as you have above?
@teclishighelf5787
@teclishighelf5787 4 жыл бұрын
This method only sniffs packets going to your device. Its not promiscuous mode.
@EricSanchez-qs3bi
@EricSanchez-qs3bi 7 ай бұрын
Great job 9999 % guy
@punkpendulums
@punkpendulums 2 жыл бұрын
05:08 how can you pretend it's 100% reliable if you never tried it and if apparently three people in the world only have already used it ?
@ABlackScreenASMR
@ABlackScreenASMR 3 жыл бұрын
Who is this talk for.. 2:24 bluetooth device developers *nods* penetration testers *nods* managers *nods* me *smiles* Old man that wants in on ur moms phone calls *smiles* Fake FBI service van *Smiles*
@Parrotassassin15TechToker
@Parrotassassin15TechToker 3 жыл бұрын
😂😂😂😂
@conforzo
@conforzo 2 жыл бұрын
Guy who wants to sleep at 6AM but the corridor above plays horrible EDM music *cries*
@EricSanchez-qs3bi
@EricSanchez-qs3bi 7 ай бұрын
Bingo
@EricSanchez-qs3bi
@EricSanchez-qs3bi 7 ай бұрын
Or cut off a person or persons payroll
@EricSanchez-qs3bi
@EricSanchez-qs3bi 7 ай бұрын
Rabel
@sophiawilson1934
@sophiawilson1934 4 жыл бұрын
Bluetooth in 2020?
@Parrotassassin15TechToker
@Parrotassassin15TechToker 3 жыл бұрын
Yeah so many things use it and bluetooth is already inherently unsecure
@EricSanchez-qs3bi
@EricSanchez-qs3bi 7 ай бұрын
Ring bell
@EricSanchez-qs3bi
@EricSanchez-qs3bi 7 ай бұрын
Sit stat ea fee er table
@EricSanchez-qs3bi
@EricSanchez-qs3bi 7 ай бұрын
Cant be a 1000 only the lord is perfect
@bluegizmo1983
@bluegizmo1983 2 жыл бұрын
This really should've been called "Reverse engineering Bluetooth devices", not hacking Bluetooth! Everything talked about here requires being already paired to the devices, that's not hacking. Hacking would be doing all this WITHOUT being paired to the devices and without having physical access to the devices.
@alabamalockpicking
@alabamalockpicking 29 күн бұрын
Hardware hacking is having physical access to the device and still hacking it
@cvoges12
@cvoges12 4 жыл бұрын
> I've learned everything I know about TCP/IP from wireshark We can tell
@mistermister8
@mistermister8 4 жыл бұрын
50 minutes of your life you'll never get back.
@Parrotassassin15TechToker
@Parrotassassin15TechToker 3 жыл бұрын
How so
Hack like Mr Robot // WiFi, Bluetooth and Scada hacking
45:23
David Bombal
Рет қаралды 2,1 МЛН
Bluetooth Reverse Engineering: Tools and Techniques
51:44
RSA Conference
Рет қаралды 7 М.
Llegó al techo 😱
00:37
Juan De Dios Pantoja
Рет қаралды 54 МЛН
Despicable Me Fart Blaster
00:51
_vector_
Рет қаралды 28 МЛН
A clash of kindness and indifference #shorts
00:17
Fabiosa Best Lifehacks
Рет қаралды 129 МЛН
Gym belt !! 😂😂  @kauermtt
00:10
Tibo InShape
Рет қаралды 17 МЛН
World's Most Famous Hacker Kevin Mitnick & KnowBe4's Stu Sjouwerman Opening Keynote
36:30
IoT Hacking - Polycom Conference Phone - Firmware Extraction
33:53
14 BANNED GADGETS YOU STILL CAN BUY ON AMAZON
12:17
TechZone
Рет қаралды 10 МЛН
Flipper Zero iPhone Bluetooth DoS Exploit
10:49
Mental Outlaw
Рет қаралды 136 М.
10 ILLEGAL GADGETS YOU CAN BUY!
9:02
BEST COOL TECH
Рет қаралды 3,6 МЛН
Track & Connect to Smartphones with a Beacon Swarm [Tutorial]
25:22
Null Byte
Рет қаралды 1,1 МЛН
Intro to Hardware Reversing: Finding a UART and getting a shell
12:07
Tony Gambacorta
Рет қаралды 885 М.
iPhone 15 Pro в реальной жизни
24:07
HUDAKOV
Рет қаралды 460 М.
Todos os modelos de smartphone
0:20
Spider Slack
Рет қаралды 63 МЛН
BEKMOBILDA Tecno Camon 30 smartfoni🔥🤩 #bekmobil
1:01
Bekmobil shorts
Рет қаралды 2,3 МЛН
S24 Ultra and IPhone 14 Pro Max telephoto shooting comparison #shorts
0:15
Photographer Army
Рет қаралды 10 МЛН
low battery 🪫
0:10
dednahype
Рет қаралды 698 М.
iPhone 15 Pro Max vs IPhone Xs Max  troll face speed test
0:33
Как удвоить напряжение? #электроника #умножитель
1:00
Hi Dev! – Электроника
Рет қаралды 1,1 МЛН