Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Trust Me, I'm an Apple Watch - On Protocol Reversing, Mimicry, and Data Exfiltration

Objective-See Foundation via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore advanced reverse-engineering techniques through a comprehensive conference talk that demonstrates how to bypass Apple's security measures by impersonating an Apple Watch. Learn detailed methodologies for reverse-engineering Apple Watch protocols, including proprietary communication systems and low-level Bluetooth exploitation techniques. Discover how to navigate and manipulate all layers of the OSI model while implementing sophisticated device mimicry strategies. Master the art of protocol analysis and understand how attackers can camouflage malicious activities by masquerading as trusted Apple devices. Examine real-world data exfiltration scenarios that exploit the trust relationships between Apple ecosystem devices. Gain insights into the security implications of Apple's walled garden approach and understand how thorough protocol knowledge can be weaponized to circumvent built-in protections. Follow along as the speaker demonstrates building a working implementation from scratch based on reverse-engineered protocols, showcasing both the technical complexity and potential security vulnerabilities in Apple's device authentication systems.

Syllabus

#OBTS v8.0: “Trust me, I’m an Apple Watch” - Nils Rollshausen

Taught by

Objective-See Foundation

Reviews

Start your review of Trust Me, I'm an Apple Watch - On Protocol Reversing, Mimicry, and Data Exfiltration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.