Bluetooth Low Energy Security Vulnerabilities

  Переглядів 863

TheDataDaddi

TheDataDaddi

День тому

In this video, I discuss security issues with the the BLE protocol, and how its encryption can be bypassed. This video is based on a paper called -Bluetooth: With Low Energy comes Low Security.
---------------------------------------------------------------------------------------------------------------------------------------------------------------
SUPPORT MY CHANNEL
If you found this content useful, please consider buying me a coffee at the link below. This goes a long way in helping me through grad school and allows me to continue making the best content possible.
www.buymeacoffee.com/TheDataD...
Thanks for your support!
---------------------------------------------------------------------------------------------------------------------------------------------------------------
Link to my video on an Introduction to the Bluetooth Protocol:
• Intro To The Bluetooth...
Link to paper this video is based on:
www.usenix.org/system/files/c...
Other relevant links and sources:
Scholarly Articles
- ieeexplore.ieee.org/document/...
- doi.org/10.1016/j.adhoc.2019....
Web Articles
- www.mathworks.com/help/blueto...
- www.headphonesty.com/2021/01/...
- learn.sparkfun.com/tutorials/....

КОМЕНТАРІ: 3
@tb2johm
@tb2johm Рік тому
The weakness in the key exchange is fixed! At least for sessions using BLE Secure Connections (which was introduced in 4.2). Instead of the TK etc, they now use a diffie-hellman key exchange which which is kind of impossible to crack. However, for "just works" (and "Passkey entry" (or 6-digit code as you refers to it) when the code is static) it is possible to do a MITM attack.
@TheDataDaddi
@TheDataDaddi Рік тому
Awesome man. Thanks for that feedback!
@dread1089
@dread1089 Рік тому
Great video.
AI/ML/DL GPU Buying Guide 2024: Get the Most AI Power for Your Budget
40:27
The Linux Bluetooth vulnerabilities
8:37
Mental Outlaw
Переглядів 31 тис.
Ages 1 - 100 Decide Who Wins $250,000
40:02
MrBeast
Переглядів 108 млн
Повістки у Києві: «Яке право вони мають забирати всіх мужиків?» #війна #мобілізація #військові
00:41
Слідство.Інфо | Розслідування, репортажі, викриття
Переглядів 869 тис.
Invention of the Internet
2:07
Historical Happenings
Переглядів 8
Snoop on Bluetooth Devices Using Kali Linux [Tutorial]
12:30
Null Byte
Переглядів 287 тис.
Sniffing BLE packets | IoT Hacking Tutorial | Hakin9 Magazine
12:29
Hakin9 Media
Переглядів 7 тис.
Why Some Designs Are Impossible to Improve: Quintessence
33:03
Design Theory
Переглядів 45 тис.
Identify & Target Bluetooth Devices with Bettercap [Tutorial]
10:35
Null Byte
Переглядів 322 тис.
Nordic nRF 52840 Dongle Setup For BLE Sniffing with Wireshark - MAC
17:17
Bluetooth: With Low Energy Comes Low Security
27:34
Mike Ryan
Переглядів 22 тис.
I Tried Hacking a Bluetooth Speaker... (and failed...)
11:12
Grant Collins
Переглядів 231 тис.
I had no idea SHEIN sold PC parts…
27:10
Linus Tech Tips
Переглядів 1,3 млн
Which Phone Unlock Code Will You Choose? 🤔️
0:12
Game9bit
Переглядів 3,6 млн
СЛОМАЛСЯ ПК ЗА 2000$🤬
0:59
Корнеич
Переглядів 1,1 млн
Сомнительно... Ну Окэй... Распаковал Nothing Phone (2a)
16:19
РасПаковка ДваПаковка
Переглядів 55 тис.
Клавиатура vs геймпад vs руль
0:47
Balance
Переглядів 323 тис.