All times are in Pacific Daylight Time (UTC-0700).
In this talk, we’ll walk through a complete Bluetooth Low Energy security assessment by focusing our attention on a single device – from start to finish. Along the way, we’re going to discuss how to select interesting targets, how to spot vulnerabilities, and some reporting practices that might make your life a little easier. We’ll also cover basic tooling and implementation strategies, and I’ll share a few insights about building skillsets and how to approach your first BLE client engagement.
© 2024 ShellCon