This is a repository containing some data and links for my Beer-Talk about Bluetooth Low Energy (BLE). See https://www.compass-security.com/de/agenda/detail/beer-talk-in-bern-bluetooth-low-energy-protocol-security-attacks/ for more infos about this event.
- Compass Beer-Talk: bluetooth_low_energy_ble_beertalk_2020-05-07.pdf
- Full Version: bluetooth_low_energy_ble_protocol_security_attacks_full_version_v1.0.pdf
- Compass Beer-Talk (07.05.2020, German): https://www.youtube.com/watch?v=hmhj3HyO48U
- BLE Hacking Demo: 1 - Sniffing a new Connection: https://www.youtube.com/watch?v=NVzCURC9380
- BLE Hacking Demo: 2 - Sniffing an Existing Connection: https://www.youtube.com/watch?v=SKYK8nkj2Kw
- BLE Hacking Demo: 3 - Device Interaction: https://www.youtube.com/watch?v=u3EzQXImME0
- BLE Hacking Demo: 4 - Connection Hijacking: https://www.youtube.com/watch?v=a-2PtDKXHTs
See pcaps directory for example PCAPs.
- Micro:Bit Sniffing Hardware: https://microbit.org/
- BtleJack Sniffing Software: https://github.com/virtualabs/btlejack
- Bluetooth Special Interest Group (SIG): https://www.bluetooth.com/
- Bluetooth Core Specifications Download: https://www.bluetooth.com/specifications/bluetooth-core-specification
- Bluetooth GATT Specifications: https://www.bluetooth.com/specifications/gatt
- Bluetooth GATT Characteristics: https://www.bluetooth.com/specifications/gatt/characteristics
- Bluetooth GATT Overview: https://www.bluetooth.com/specifications/gatt/generic-attributes-overview
- Linux Bluetooth Protocol Stack BlueZ: http://www.bluez.org/
- Introduction to Bluetooth Low Energy: https://learn.adafruit.com/introduction-to-bluetooth-low-energy/introduction
- Reverse Engineering a Bluetooth Low Energy Light Bulb: https://learn.adafruit.com/reverse-engineering-a-bluetooth-low-energy-light-bulb/explore-gatt
- Introducing the Adafruit Bluefruit LE Sniffer: https://learn.adafruit.com/introducing-the-adafruit-bluefruit-le-sniffer/introduction
- Bluetooth Range Information: https://blog.nordicsemi.com/getconnected/things-you-should-know-about-bluetooth-range
- Getting Started with Bluetooth Low Energy. O'Reilly. 2014. ISBN: 9781491900550.
- BLE Pairing and Bonding: https://www.kynetics.com/docs/2018/BLE_Pairing_and_bonding/
- Bluetooth Pairing Part 1: Pairing Feature Exchange: https://www.bluetooth.com/blog/bluetooth-pairing-part-1-pairing-feature-exchange/
- Bluetooth Pairing Part 2: Key Generation Methods: https://www.bluetooth.com/blog/bluetooth-pairing-part-2-key-generation-methods
- Bluetooth Pairing Part 3: Low Energy Legacy Pairing Passkey Entry: https://www.bluetooth.com/blog/bluetooth-pairing-passkey-entry
- Bluetooth Pairing Part 4: Bluetooth Low Energy Secure Connections - Numeric Comparison: https://www.bluetooth.com/blog/bluetooth-pairing-part-4/
- Bluetooth Technology Protecting Your Privacy: https://www.bluetooth.com/blog/bluetooth-technology-protecting-your-privacy/
- Corona-App: Apple und Google wollen Regierungswünschen nachkommen: https://www.heise.de/newsticker/meldung/Corona-App-Apple-und-Google-wollen-Regierungswuenschen-nachkommen-4709428.html
- Die Schweizer Corona-Warn-App kommt – das sind die wichtigsten Fakten: https://www.netzwoche.ch/news/2020-05-04/die-schweizer-corona-warn-app-kommt-das-sind-die-wichtigsten-fakten
- Decentralized Privacy-Preserving Proximity Tracing: https://github.com/DP-3T/documents/
- Contact Tracing App DP3T - These are the Risks of the Swiss Solution. Marc Ruef: https://www.scip.ch/en/?labs.20200427
- DP3t: Privacy and Security Attacks on Digital Proximity Tracing Systems:
- https://github.com/DP-3T/documents/blob/master/Security%20analysis/Privacy%20and%20Security%20Attacks%20on%20Digital%20Proximity%20Tracing%20Systems.pdf
- Privacy-Preserving Contact Tracing. Apple & Google: https://www.apple.com/covid19/contacttracing/
- Understanding Bluetooth Security: https://duo.com/decipher/understanding-bluetooth-security
- Mike Ryan, Bluetooth LE Security: https://lacklustre.net/bluetooth/
- A Basic Introduction to BLE Security: https://www.digikey.com/eewiki/display/Wireless/A+Basic+Introduction+to+BLE+Security
- Deep Dive into Bluetooth LE Security: https://medium.com/rtone-iot-security/deep-dive-into-bluetooth-le-security-d2301d640bfc
- Mike Ryan. USENIX WOOT. August 2013. Bluetooth: With Low Energy Comes Low Security
- Tal Melamed. SHA2017. Hack-a-ble
- Mike Ryan. BlackHat 2013. Bluetooth Smart: The Good, the Bad, the Ugly, and the Fix!
- Slawomir Jasek. Blue Picking - Hacking Bluetooth Smart Locks. HackInTheBox 2017
- Damien Cauquil. Weaponizing the BBC Micro Bit. DEF CON 25. 2017
- Damien Cauquil. Bluetooth Low Energy Attacks. Crash Course. 2018
- Damien Cauquil. You had better secure your BLE devices. DEF CON 26. 2018
- Mike Ryan. Bluetooth Hacking: Tools And Techniques. hardwear.io 2019
- Taking Bluetooth lockpicking to the next level. Ray and mh. CCCamp19. 2019
- Damien Cauquil. Defeating BLE 5 PRNG for Fun and Jamming. DEF CON 27. 2019
- Jan Ruge. No PoC? No Fix! - A sad Story about Bluetooth Security. DiVOC. 2020.