Exploiting Bluetooth Vulnerabilities: From Vehicle Systems to Bank Account Access
AI Engineer - Learn how to integrate AI into software applications
Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about critical Bluetooth security vulnerabilities in modern vehicles and aircraft systems through this DEF CON 32 conference talk. Discover how infotainment systems' increased functionality and wireless connectivity create new attack surfaces, particularly due to patching challenges. Explore the BlueToolkit framework for testing and exploiting Bluetooth Classic vulnerabilities, including practical demonstrations and newly discovered exploits. Examine findings from research that uncovered 64 vulnerabilities across 22 modern cars and the Garmin Flight Stream flight management system. Gain insights into implementation-specific vulnerabilities that could enable information theft, man-in-the-middle attacks, and privilege escalation leading to account hijacking. Master techniques and methodologies that make Bluetooth security research more accessible and reproducible for security professionals and researchers.
Syllabus
DEF CON 32 - Exploiting Bluetooth from your car to the bank account$$ - Yso & Martin Strohmeier
Taught by
DEFCONConference