Bluetooth_Low_Energy_BLE
Bluetooth_Low_Energy_BLE copied to clipboard
Bluetooth Low Energy BLE Beertalk

What is this?
This is a repository containing some data and links for my Beer-Talk about Bluetooth Low Energy (BLE). See https://www.compass-security.com/de/agenda/detail/beer-talk-in-bern-bluetooth-low-energy-protocol-security-attacks/ for more infos about this event.
Slides
- Compass Beer-Talk: bluetooth_low_energy_ble_beertalk_2020-05-07.pdf
- Full Version: bluetooth_low_energy_ble_protocol_security_attacks_full_version_v1.0.pdf
Videos
Presentation
- Compass Beer-Talk (07.05.2020, German): https://www.youtube.com/watch?v=hmhj3HyO48U
Demo Videos
- BLE Hacking Demo: 1 - Sniffing a new Connection: https://www.youtube.com/watch?v=NVzCURC9380
- BLE Hacking Demo: 2 - Sniffing an Existing Connection: https://www.youtube.com/watch?v=SKYK8nkj2Kw
- BLE Hacking Demo: 3 - Device Interaction: https://www.youtube.com/watch?v=u3EzQXImME0
- BLE Hacking Demo: 4 - Connection Hijacking: https://www.youtube.com/watch?v=a-2PtDKXHTs
Example PCAPs
See pcaps directory for example PCAPs.
Hardware / Software References
- Micro:Bit Sniffing Hardware: https://microbit.org/
- BtleJack Sniffing Software: https://github.com/virtualabs/btlejack
References
Specifications
- Bluetooth Special Interest Group (SIG): https://www.bluetooth.com/
- Bluetooth Core Specifications Download: https://www.bluetooth.com/specifications/bluetooth-core-specification
- Bluetooth GATT Specifications: https://www.bluetooth.com/specifications/gatt
- Bluetooth GATT Characteristics: https://www.bluetooth.com/specifications/gatt/characteristics
- Bluetooth GATT Overview: https://www.bluetooth.com/specifications/gatt/generic-attributes-overview
- Linux Bluetooth Protocol Stack BlueZ: http://www.bluez.org/
BLE Introduction
- Introduction to Bluetooth Low Energy: https://learn.adafruit.com/introduction-to-bluetooth-low-energy/introduction
- Reverse Engineering a Bluetooth Low Energy Light Bulb: https://learn.adafruit.com/reverse-engineering-a-bluetooth-low-energy-light-bulb/explore-gatt
- Introducing the Adafruit Bluefruit LE Sniffer: https://learn.adafruit.com/introducing-the-adafruit-bluefruit-le-sniffer/introduction
- Bluetooth Range Information: https://blog.nordicsemi.com/getconnected/things-you-should-know-about-bluetooth-range
- Getting Started with Bluetooth Low Energy. O'Reilly. 2014. ISBN: 9781491900550.
BLE Pairing
- BLE Pairing and Bonding: https://www.kynetics.com/docs/2018/BLE_Pairing_and_bonding/
- Bluetooth Pairing Part 1: Pairing Feature Exchange: https://www.bluetooth.com/blog/bluetooth-pairing-part-1-pairing-feature-exchange/
- Bluetooth Pairing Part 2: Key Generation Methods: https://www.bluetooth.com/blog/bluetooth-pairing-part-2-key-generation-methods
- Bluetooth Pairing Part 3: Low Energy Legacy Pairing Passkey Entry: https://www.bluetooth.com/blog/bluetooth-pairing-passkey-entry
- Bluetooth Pairing Part 4: Bluetooth Low Energy Secure Connections - Numeric Comparison: https://www.bluetooth.com/blog/bluetooth-pairing-part-4/
BLE Privacy
- Bluetooth Technology Protecting Your Privacy: https://www.bluetooth.com/blog/bluetooth-technology-protecting-your-privacy/
COVID19
- Corona-App: Apple und Google wollen Regierungswünschen nachkommen: https://www.heise.de/newsticker/meldung/Corona-App-Apple-und-Google-wollen-Regierungswuenschen-nachkommen-4709428.html
- Die Schweizer Corona-Warn-App kommt – das sind die wichtigsten Fakten: https://www.netzwoche.ch/news/2020-05-04/die-schweizer-corona-warn-app-kommt-das-sind-die-wichtigsten-fakten
- Decentralized Privacy-Preserving Proximity Tracing: https://github.com/DP-3T/documents/
- Contact Tracing App DP3T - These are the Risks of the Swiss Solution. Marc Ruef: https://www.scip.ch/en/?labs.20200427
- DP3t: Privacy and Security Attacks on Digital Proximity Tracing Systems:
- https://github.com/DP-3T/documents/blob/master/Security%20analysis/Privacy%20and%20Security%20Attacks%20on%20Digital%20Proximity%20Tracing%20Systems.pdf
- Privacy-Preserving Contact Tracing. Apple & Google: https://www.apple.com/covid19/contacttracing/
BLE Security Research
- Understanding Bluetooth Security: https://duo.com/decipher/understanding-bluetooth-security
- Mike Ryan, Bluetooth LE Security: https://lacklustre.net/bluetooth/
- A Basic Introduction to BLE Security: https://www.digikey.com/eewiki/display/Wireless/A+Basic+Introduction+to+BLE+Security
- Deep Dive into Bluetooth LE Security: https://medium.com/rtone-iot-security/deep-dive-into-bluetooth-le-security-d2301d640bfc
BLE Security Talks
- Mike Ryan. USENIX WOOT. August 2013. Bluetooth: With Low Energy Comes Low Security
- Video: https://www.youtube.com/watch?v=Mo-FsEmaqpo
- Slides: https://lacklustre.net/bluetooth/bluetooth_with_low_energy_comes_low_security-mikeryan-usenix_woot_2013-slides.pdf
- Whitepaper: https://lacklustre.net/bluetooth/Ryan_Bluetooth_Low_Energy_USENIX_WOOT.pdf
- Tal Melamed. SHA2017. Hack-a-ble
- Video: https://media.ccc.de/v/SHA2017-230-hack-a-ble
- Mike Ryan. BlackHat 2013. Bluetooth Smart: The Good, the Bad, the Ugly, and the Fix!
- Video: https://www.youtube.com/watch?v=SoH11fi-FcA
- Slides: https://lacklustre.net/bluetooth/bluetooth_smart_good_bad_ugly_fix-mikeryan-blackhat_2013.pdf
- Slawomir Jasek. Blue Picking - Hacking Bluetooth Smart Locks. HackInTheBox 2017
- Slides: https://conference.hitb.org/hitbsecconf2017ams/materials/D2T3%20-%20Slawomir%20Jasek%20-%20Blue%20Picking%20-%20Hacking%20Bluetooth%20Smart%20Locks.pdf
- Damien Cauquil. Weaponizing the BBC Micro Bit. DEF CON 25. 2017
- Video: https://www.youtube.com/watch?v=I9AqIaMjYcw
- Slides: https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEF%20CON%2025%20-%20Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf
- Damien Cauquil. Bluetooth Low Energy Attacks. Crash Course. 2018
- Slides: https://nis-summer-school.enisa.europa.eu/2018/cources/IOT/nis-summer-school-damien-cauquil-BLE-workshop.pdf
- Damien Cauquil. You had better secure your BLE devices. DEF CON 26. 2018
- Video: https://www.youtube.com/watch?v=VHJfd9h6G2s
- Slides: https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Updated.pdf
- Mike Ryan. Bluetooth Hacking: Tools And Techniques. hardwear.io 2019
- Video: https://www.youtube.com/watch?v=8kXbu2Htteg
- Slides: https://hardwear.io/usa-2019/presentations/Bluetooth-Hacking-Mike%20Ryan-hardwear-io-usa-2019.pdf
- Taking Bluetooth lockpicking to the next level. Ray and mh. CCCamp19. 2019
- Video: https://media.ccc.de/v/Camp2019-10241-taking_bluetooth_lockpicking_to_the_next_level
- Damien Cauquil. Defeating BLE 5 PRNG for Fun and Jamming. DEF CON 27. 2019
- Video: https://www.youtube.com/watch?v=wkIdpK7mAk4
- Slides: https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming.PDF
- Jan Ruge. No PoC? No Fix! - A sad Story about Bluetooth Security. DiVOC. 2020.
- Video: https://media.ccc.de/v/DiVOC-7-no_poc_no_fix_a_sad_story_about_bluetooth_security