Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems

By Nitin Lakshmanan , Sunil Kumar 1 on 25 Mar 2022 @ Insomnihack
πŸ“Ή Video πŸ”— Link
#bluetooth #hardware-embedded #iot-pentesting #bluetooth #wireless-security #mobile-pentesting #hardware-hacking
Focus Areas: πŸ”§ Hardware Security , πŸ“‘ IoT Security , πŸ“± Mobile Security , 🌐 Network Security

Presentation Material

Abstract

Consumer IoT devices manifest in a variety of forms today, including fitness trackers, rings, smart-watches, pacemakers, and so on. The wearable IoT market is dominated by small and medium-sized business, who are often in a rush to hit the shelves before their competitors, and trivialize the need for security in the bargain, citing no “return on investment”.

In our presentation, we deep-dive into the wireless protocol of choice for wearables - Bluetooth Low Energy (BLE), and its impact from a security perspective. We use a USB-based bluetooth hacking hardware board called Ubertooth-One to analyze popular market products, and also perform a live demo on stealing information from a fitness tracker using standard Android app development practices. We wrap up with a discussion on simple cryptographic approaches and BLE-hardening mechanisms to prevent such attacks on wearable and IoT platforms.