Audit and hacking to Bluetooth Low-Energy (BLE) devices
Pablo González Pérez. Telefónica
We are finding more and more devices connected around us. BLE (Bluetooth Low-Energy) technology is increasingly distributed and can be found at home, in the office and on the street. It is a technology that simplifies the use of Bluetooth and makes it more efficient.
Energy saving can be faced with security and the lack of standardization in many cases, causes us to find weaknesses and attack vectors that can be used to obtain information from a device, manipulation of it or that the device performs an action for which it was not designed or for which it was not authorized.
This workshop will demonstrate techniques for auditing these devices. Totally practical. We will use MicroBit.
Technical Requirements:
- Attendees can bring their computer to follow the workshop guidelines although it is not necessary since the speaker will teach the workshop as a master class.
- Micro: bit boards and the nRF Connect mobile application will be used.