From Fault Injection to RCE: Analyzing a Bluetooth Tracker Security Vulnerabilities
media.ccc.de via YouTube
Start speaking a new language. It’s just 3 weeks away.
Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a detailed security analysis presentation from the 38th Chaos Communication Congress that demonstrates how to exploit vulnerabilities in the Chipolo ONE Bluetooth tracker. Learn about advanced hardware and software attack techniques, including fault injection to bypass debug locks on the Dialog DA14580 chip, firmware extraction and reverse engineering using Ghidra, cryptographic weakness analysis, and achieving remote code execution through buffer overflow exploitation. Discover the challenges of responsible vulnerability disclosure when dealing with unpatchable security flaws, as presenter Nicolas Oberli walks through the complete journey from initial hardware manipulation to achieving full remote control of the device over Bluetooth.
Syllabus
38C3 - From fault injection to RCE: Analyzing a Bluetooth tracker
Taught by
media.ccc.de