Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

From Fault Injection to RCE: Analyzing a Bluetooth Tracker Security Vulnerabilities

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a detailed security analysis presentation from the 38th Chaos Communication Congress that demonstrates how to exploit vulnerabilities in the Chipolo ONE Bluetooth tracker. Learn about advanced hardware and software attack techniques, including fault injection to bypass debug locks on the Dialog DA14580 chip, firmware extraction and reverse engineering using Ghidra, cryptographic weakness analysis, and achieving remote code execution through buffer overflow exploitation. Discover the challenges of responsible vulnerability disclosure when dealing with unpatchable security flaws, as presenter Nicolas Oberli walks through the complete journey from initial hardware manipulation to achieving full remote control of the device over Bluetooth.

Syllabus

38C3 - From fault injection to RCE: Analyzing a Bluetooth tracker

Taught by

media.ccc.de

Reviews

Start your review of From Fault Injection to RCE: Analyzing a Bluetooth Tracker Security Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.