Building a Better Bluetooth Attack Framework: Ubertooth attack and injection tool suite

Presented at REcon 2015, June 20, 2015, 5 p.m. (30 minutes).

Bluetooth attacks have been around for some time. Previously we did everything from hack and flash our own dongles, to pay out the nose for professional solutions. But then came the Ubertooth! When the Ubertooth was released, a light in the Bluetooth pentesting tunnel was finally seen... or was it? The Ubertooth, in its current state, lacks several key features that are necessary to make it the ultimate Bluetooth pentest device. This talk focuses on those short-comings, why they matter, and will drop the code to overcome them.


Presenters:

Links:

Tags:

Similar Presentations: