Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

From Fault Injection to RCE: Analyzing a Bluetooth Tracker

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a comprehensive security analysis of the Chipolo ONE Bluetooth tracker in this 32-minute conference talk from the 38th Chaos Communication Congress (38C3). Follow security researcher Nicolas Oberli's journey from extracting firmware from a locked Dialog DA14580 chip using fault injection techniques to achieving remote code execution over Bluetooth. Learn about multiple security techniques applicable to IoT device analysis, including bypassing debug locking mechanisms on previously unbroken chips, reverse engineering unknown firmware with Ghidra and limited documentation, analyzing weak cryptographic algorithms for authentication bypasses, exploiting buffer overflows for code execution, and navigating the disclosure process for unpatchable vulnerabilities. This security-focused presentation provides valuable insights for hardware hackers and security professionals interested in IoT device vulnerabilities and analysis methodologies.

Syllabus

38C3 - From fault injection to RCE: Analyzing a Bluetooth tracker

Taught by

media.ccc.de

Reviews

Start your review of From Fault Injection to RCE: Analyzing a Bluetooth Tracker

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.