
Have fun and learn how to secure the devices - by hands-on hacking BLE, NFC/RFID, embedded hardware, based on smart locks, access control systems and other high risk deices.
Have fun and learn how to secure the devices - by hands-on hacking BLE, NFC/RFID, embedded hardware, based on smart locks, access control systems and other high risk deices.
Bluetooth Low Energy Hacking Masterclass
This intensive two-day training provides a deep dive into Bluetooth Low Energy security, equipping cybersecurity professionals with advanced skills to identify, analyze, and exploit vulnerabilities in BLE devices. The session begins with the foundational exploration on how this technology works by interacting with your dedicated, included device: understanding BLE broadcasting (advertising device presence, trackers, beacons) and connections (services, characteristics, GATT reading/writing/notifications). You will quickly turn on your simulated “lightbulb” and surprisingly - you will already be able to take control over so many devices that do not implement any security mechanisms at all.
Bluetooth Low Energy and NFC/RFID Security Essentials
Bluetooth Low Energy (BLE) and NFC/RFID are widely used wireless technologies that power a broad range of devices, from IoT gadgets and toys to high-stakes systems like access control systems, smart locks, medical equipment, and payment solutions. With the rapid growth in the number of such devices, securing them has become a critical priority, driving a surging demand for specialists in this field. This unique hands-on course meets this demand by providing a thorough overview of the security of BLE and NFC technologies, along with practical, real-world skills that are immediately applicable.
Security Assessment of Bluetooth Low Energy devices
Bluetooth Low Energy is one of the most common and rapidly growing IoT technologies. We are immersed in surrounding BLE signals: phones, beacons, wearables, TVs, home appliances, toothbrushes, sex toys, light bulbs, smart locks, electric scooters, cars, medical devices, crypto wallets, 2FA, banking tokens, payment terminals - to name just a few. Unfortunately the prevalence of technology does not come with security. Alarming vulnerabilities are revealed day by day – not only in individual devices’ implementations, but also generic: in the Bluetooth specification itself. And yet, the knowledge on how to comprehensively assess security of such devices still remains uncommon. This training aims to fill this gap, with the best possible - hands-on approach.
Share this post
Twitter
Google+
Facebook
Reddit
LinkedIn
StumbleUpon
Email