Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares

  Переглядів 1,329

DarkMentorLLC

DarkMentorLLC

День тому

Bluetooth Low Energy (BLE) has seen widespread product adoption and a renewed interest from a security community whose interest in Classic Bluetooth (BT) had waned. Protocols that run "above" the Host Controller Interface (HCI) on the BLE stack are typically handled in full OSes or applications. Vulnerabilities at these layers are plentiful (~70 in Android in 2019) and comparatively well-understood. But for performance and abstraction reasons, protocols below the HCI layer are always handled in firmware running on microprocessors designed for BLE support. Until now, there had been only a single publicly disclosed remote code execution vulnerability in BLE below the HCI layer: CVE-2018-16986, Armis' BleedingBit. This talk describes my process of going from knowing nothing about Bluetooth, to reverse engineering multiple vendors' firmwares, and finding remote code execution exploits for multiple new vulnerabilities at the lowest levels of the BLE protocol stack which I will demonstrate. Exploits at this layer are of particular interest because they require neither pairing nor authentication, merely proximity, to exploit.
The slides, whitepaper, and tool for this talk are available at github.com/darkmentorllc

КОМЕНТАРІ
Gazan поет на сцене Меломан
00:11
Gazan
Переглядів 1,3 млн
ISSEI funny story 😂😂😂Strange World 🌏 Green
00:27
ISSEI / いっせい
Переглядів 77 млн
😮Бутер по цене Айфона😱
0:34
Demin's Lounge
Переглядів 436 тис.
iphone X Convert To Iphone 11Pro #iphonex #iphone11pro #shorts
0:13
Technical Mobile
Переглядів 4,7 млн