Bluetooth Hacking is one of the most under-appreciated threats in our IoT World!
For years, cybersecurity researchers considered Bluetooth safe and secure, but in recent weeks and months, numerous frightening and severe vulnerabilities have been found within this protocol. These exploits include sending arbitrary commands into your phone or desktop (Blueducky), to the most recent, sending arbitrary commands into EV charging stations. Considering how important our phones are to our life and how volatile lithium-ion batteries are, these are critical vulnerabilities.
Hackers-Arise has been on the leading edge of warning the cybersecurity community of these vulnerabilities and exploits. This is why we have developed a special class just to address Bluetooth vulnerabilities and their exploitation.
To get on the leading edge of the rapidly growing field, sign up for this key class.
The outline of the course is below.
Bluetooth Hacking
Introduction to the Bluetooth and BLE protocol
Bluetooth security mechanisms
Generic Access Profile and Generic Attribute Profile
Configuring BLE interfaces
Bluetooth and BLE reconnaissance
Sending Arbitrary Commands into Bluetooth with GATTTool
Enumerating Characteristics and Services
Jamming, Sniffing, and Hijacking Bluetooth Communication
Spoofing MAC Addresses
The BlueDucky Exploit of the Bluetooth Stack on Android, Windows, IoS, and Linux
Exploiting the EV Charging Stations with Bluetooth
Mitigating Bluetooth Vulnerabilities in our Modern IoT World.
To get the must from the class, you will need the following hardware and software:
1. A Bluetooth 5.0 or greater external USB adapter
2. An Ubertooth adapter
3. a MicroBit Adapter
4. Dragon OS and Kali OS