top of page
Search
Writer's pictureotw

Bluetooth Hacking, January 14-16

Bluetooth Hacking is one of the most under-appreciated threats in our IoT World!


For years, cybersecurity researchers consider Bluetooth safe and secure but in recent weeks and months, numerous vulnerabilities have been found within this protocol that are very frightening. These exploits include send arbitrary command into your phone or desktop (Blueducky) to the most recent, sending arbitrary commands into EV charging stations. Considering how important our phones are to our life and how volatile lithium-ion batteries are, these are critical vulnerabilities.






Hackers-Arise has been on the leading edge of warning the cybersecurity community of these vulnerabilities and exploits. This is why we have developed a special class just to address Bluetooth vulnerabilities and their exploitation.


To get on the leading edge of the rapidly growing field, sign up for this key class.


The outline of the course is below.


Bluetooth Hacking


  1. Introduction to the Bluetooth and BLE protocol

  2. Bluetooth security mechanisms

  3. Generic Access Profile and Generic Attribute Profile

  4. Configuring BLE interfaces

  5. Bluetooth and BLE reconnaissance

  6. GATTTool

  7. Enumerating Characteristics and Services

  8. Spoofing MAC Addresses

  9. The BlueDucky Exploit of the Bluetooth Stack

  10. Exploiting the EV Charging Stations with Bluetooth

  11. Mitigating Bluetooth Vulnerabilities in our Modern IoT World.

86 views

Recent Posts

See All
bottom of page