In this talk, we’ll walk through a complete Bluetooth Low Energy security
assessment by focusing our attention on a single device – from start to finish.
Along the way, we’re going to discuss how to select interesting targets, how to
spot vulnerabilities, and some reporting practices that might make your life a
little easier. We’ll also cover basic tooling and implementation strategies,
and I’ll share a few insights about building skillsets and how to approach your
first BLE client engagement.