DEF CON 24 - Picking Bluetooth Low Energy Locks a Quarter Mile Away

  Переглядів 9,874

HackersOnBoard

HackersOnBoard

7 років тому

Anthony Rose Hacker
Ben Ramsey, Hacker
Many Bluetooth Low Energy (BLE) enabled deadbolts and padlocks have hit the market recently. These devices promise convenience and security through smartphone control. We investigated sixteen of these products from multiple vendors and discovered wireless vulnerabilities in most of them. Using a $50 antenna, we successfully picked vulnerable locks from over 400 meters away. In this presentation we introduce open source tools to crack each of the vulnerable BLE locks. Furthermore, after surveying the open source Bluetooth hacking tools currently available, we find very little support for BLE. So, to make discovering and range finding to BLE devices easier, we introduce a new open source war-walking tool compatible with both Bluetooth Classic and BLE.
Anthony Rose is an electrical engineer with five years of network security experience. His prior work includes traffic and quality optimization for wireless video protocols. Currently he focuses on Bluetooth security and wireless penetration testing.
Ben Ramsey, PhD, CISSP, has over a decade of experience in network security research. His work focuses on critical infrastructure protection and low power wireless protocols, such as ZigBee, Z-Wave, and Bluetooth Low Energy. He has published in several academic journals and has presented research at multiple conferences, including GLOBECOM, MILCOM, SenseApp, and ShmooCon.

КОМЕНТАРІ: 11
@zg9xUmvV
@zg9xUmvV 6 років тому
there are a few kickstarter doorlocks out there... that you might be interested in... lockitron, sesame, etc...
@ImARichard
@ImARichard 4 роки тому
Glad to see my smart lock isn't vulnerable 😂
@AsmodeusMictian
@AsmodeusMictian 5 років тому
Dude....your p's pop from the percussion provided.... MOVE YA DAMN FACE MAN lol
@Fallen7Pie
@Fallen7Pie 5 років тому
wanna walk around with a laptop unquestioned. reflective vest + polo + toughbook
@mohammadafaneh3481
@mohammadafaneh3481 6 років тому
Can you count how many times he said “actually”??
@shady4tv
@shady4tv 2 роки тому
first time speaker yet no drink?
@RandTheRand
@RandTheRand 7 років тому
is that 3 bluetooth sniffers in the usb hub? if so why 3
@zg9xUmvV
@zg9xUmvV 6 років тому
he explains very clearly why he is using 3 at the same time.
@Fine_i_set_the_handle
@Fine_i_set_the_handle 4 роки тому
yea no one with this knowledge is going to rob houses, they're going to go be an electrical engineer and make way more money not to mention just kicking down the door is easier
@secretcctvcameraOG
@secretcctvcameraOG 7 років тому
Thank you for raping my inbox.
Defcon 21 - The Secret Life of SIM Cards
42:36
HackersOnBoard
Переглядів 692 тис.
DIY Vertical Garden
01:00
Totally Handy Shorts
Переглядів 9 млн
Я ЛЮБЛЮ УКРАЇНУ 3 сезон 3 випуск
1:35:26
Я ЛЮБЛЮ УКРАЇНУ
Переглядів 180 тис.
skibidi toilet 72 (part 1)
03:06
DaFuq!?Boom!
Переглядів 26 млн
Defcon 21 - Forensic Fails - Shift + Delete Won't Help You Here
47:10
HackersOnBoard
Переглядів 634 тис.
DEF CON 31 War Stories - Living Next Door to Russia - Mikko Hypponen
47:46
DEFCONConference
Переглядів 40 тис.
Howard Payne & Deviant Ollam  - This Key is Your Key, This Key is My Key
52:13
I built a 6-axes 3D printer that could be groundbreaking!
26:52
Proper Printing
Переглядів 59 тис.
I'll Let Myself In: Tactics of Physical Pen Testers
44:56
Wild West Hackin' Fest
Переглядів 2,8 млн
Cracking the Lens: Targeting HTTP's Hidden Attack-Surface
44:06
Black Hat
Переглядів 93 тис.
Эта собака может перерождаться!😱 #фильм #сериал
0:59
Отец подарил дочери...🔥
0:34
Narezchik Lombard
Переглядів 20 млн
Чи помічали ви що у фільмах Адама Сендлера...
0:47
Recap UA \ Рекап ЮА
Переглядів 308 тис.