Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Bluetooth Smart - The Good, The Bad, The Ugly, and The Fix

Black Hat via YouTube

Overview

This course aims to educate learners on Bluetooth Smart technology, covering its design, vulnerabilities, and solutions. By the end of the course, students will understand the workings of Bluetooth Smart from the PHY layer to the application layer, identify weaknesses in its key exchange process, and implement a secure fix using Elliptic Curve Diffie-Hellman. The course teaches skills such as sniffing and recovering encryption keys, implementing secure key exchange protocols, and using tools like Wireshark for analysis. The teaching method includes theoretical explanations, live demonstrations, and practical examples. This course is intended for individuals interested in understanding Bluetooth Smart technology, its security implications, and implementing secure communication protocols.

Syllabus

Intro
Why Bluetooth Smart? (2)
What is Bluetooth Smart?
Protocol Stack
Hopping
Example GATT Service: Heart Rate
Ubertooth Block Diagram
PHY Layer.. Link Layer..
Wireshark Awesomeness
Custom key Exchange Protocol
LTK Reuse
The Ugly: Recap
My Qualifications
Why Secure Simple Pairing?
SSP in Bluetooth Smart
Backward Compatibility
Demo
Summary
Capabilities
Software
Happy Birthday

Taught by

Black Hat

Reviews

Start your review of Bluetooth Smart - The Good, The Bad, The Ugly, and The Fix

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.