top of page

Bluetooth Hacking, January 28-30

Writer's picture: otwotw

Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT devices!


For years, cybersecurity researchers considered Bluetooth safe and secure, but in recent weeks and months, numerous frightening and severe vulnerabilities have been found within this protocol. These exploits include sending arbitrary commands into your phone or desktop (Blueducky), to the most recent, sending arbitrary commands into EV charging stations. Considering how important our phones are to our life and how volatile lithium-ion batteries are, these are critical vulnerabilities.



Hackers-Arise has been on the leading edge of warning the cybersecurity community of these vulnerabilities and exploits. This is why we have developed a special class just to address Bluetooth vulnerabilities and their exploitation.


To get on the leading edge of the rapidly growing field, sign up for this key class.


The outline of the course is below.


Bluetooth Hacking


  1. Introduction to the Bluetooth and BLE protocol

  2. Bluetooth security mechanisms

  3. Generic Access Profile and Generic Attribute Profile

  4. Configuring BLE interfaces

  5. Bluetooth Classic and BLE reconnaissance

  6. Sending Arbitrary Commands into Bluetooth with GATTTool

  7. Enumerating Bluetooth Characteristics and Services

  8. Bluetooth Sniffing and Jamming

  9. Hijacking Bluetooth Communication

  10. Spoofing MAC Addresses

  11. The CVE-2023-45866 command injection attack on the Bluetooth Stack on Android, Windows, IoS, and Linux

  12. Exploiting the EV Charging Stations with Bluetooth

  13. Bluetooth Security Assessment Methodology (BSAM)

  14. Mitigating Bluetooth Vulnerabilities in our Modern IoT World.



    This live-training is part of our Subscriber Pro and Path to Cyberwarrior packages or can be purchased separately for just $299 here.


    To get the must from the class, you will need the following hardware and software:


    1. A Bluetooth 5.0 or greater external USB adapter

    2. a MicroBit Adapter

    3. Dragon OS and Kali OS

    4. A HackRF One

    5. Nordic Semi-conductor nRF5280 USB dongle


bottom of page