У нас вы можете посмотреть бесплатно Hacking And Exploit Development For Bluetooth Low Energy (BLE) - Sarah Mader или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
The distribution of Bluetooth Low Energy capable devices on the market is steadily increasing. Despite repeatedly published vulnerabilities in the protocol or specific devices, the standard enjoys great popularity. To scrutinize the security of BLE-enabled devices, no expensive test devices are necessary, although the complexity of the protocol creates a hurdle for beginners. To address this gap, the talk will first provide a general introduction to the technology as well as an overview of current attack scenarios and tools. The practical part will then introduce the Mirage framework and demonstrate the development of a test scenario. Finally, there will be a demonstration of the previously developed exploit. Speaker Sarah Mader After successfully completing my Master of Science in IT Security at the Ruhr-Universität Bochum, I started working as a penetration tester at NSIDE Attack Logic in Munich. Since I wrote my master’s thesis on automating security analysis of Bluetooth Low Energy enabled IoT devices, my main focus is on the IoT area. Having experienced first-hand how complex the Bluetooth Low Energy protocol can be for beginners, I wanted to share some of my experiences.