lecture: Building a Better Bluetooth Attack Framework
Ubertooth attack and injection tool suite
Bluetooth attacks have been around for some time. Previously we did everything from hack and flash our own dongles, to pay out the nose for professional solutions. But then came the Ubertooth! When the Ubertooth was released, a light in the Bluetooth pentesting tunnel was finally seen... or was it? The Ubertooth, in its current state, lacks several key features that are necessary to make it the ultimate Bluetooth pentest device. This talk focuses on those short-comings, why they matter, and will drop the code to overcome them.
Speakers
Chris Weedon |