PRESENTATION, VIDEO | September 30, 2020

Breaking Bluetooth Low Energy – A Deep Dive (Breaking BLE series – part 2)

Maxine Filcher, Security Consultant at IOActive, continues from her ‘Introduction to Bluetooth Low Energy Exploitation,’ and presents a deep dive into the key components and tools for breaking BLE devices, from the perspective of a pentester and researcher.

PRESENTATION, VIDEO | May 28, 2020

Introduction to Bluetooth Low Energy Exploitation (Breaking BLE series – part 1)

Bluetooth, especially Bluetooth Low Energy (BLE), has become the ubiquitous backbone that modern devices use to interact with each other.
From mobile, to IoT, to automotive, most smart devices now support Bluetooth connections.

This enhanced connectivity expands the attack surface making this attack vector an increasingly necessary aspect of security testing.