From Fault Injection to RCE: Analyzing a Bluetooth Tracker Security Vulnerabilities
media.ccc.de via YouTube
AI Engineer - Learn how to integrate AI into software applications
Google, IBM & Meta Certificates — 40% Off for a Limited Time
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a detailed security analysis presentation from the 38th Chaos Communication Congress that demonstrates how to exploit vulnerabilities in the Chipolo ONE Bluetooth tracker. Learn about advanced hardware and software attack techniques, including fault injection to bypass debug locks on the Dialog DA14580 chip, firmware extraction and reverse engineering using Ghidra, cryptographic weakness analysis, and achieving remote code execution through buffer overflow exploitation. Discover the challenges of responsible vulnerability disclosure when dealing with unpatchable security flaws, as presenter Nicolas Oberli walks through the complete journey from initial hardware manipulation to achieving full remote control of the device over Bluetooth.
Syllabus
38C3 - From fault injection to RCE: Analyzing a Bluetooth tracker
Taught by
media.ccc.de